Resources

Access the latest resources including White Papers, Case Studies, Product Descriptions, Analysts Reports, and more, covering the topic of Cyber Threat Intelligence. Experts share their insights for Threat Analysts, Security Analysts, Managers of Threat Intelligence / SOC / CERT, and CISOs.

Company description

EclecticIQ - Company description English

A 2-page introduction to EclecticIQ. We empower cyber defenses with Threat Intelligence.

Download company profile

Company description

EclecticIQ - Unternehmensprofil German

Kurzvorstellung von EclecticIQ , einer der weltweit führenden Cyber Threat Intelligence Anbieter

Unternehmensprofil herunterladen

Company description

EclecticIQ - Profil de la Societé French

Une introduction de 2 pages à EclecticIQ, un leader technologique mondial dans le domaine de l'analyse des cyber-menaces.

Télécharger la présentation

Product description

EclecticIQ Platform - Product description English

With EclecticIQ Platform, your analysts take back control of their threat reality and drive down mean time to remediation from days to minutes.

Download product description

Product datasheet

EclecticIQ Platform - Enterprise Data Sheet English

Harnessing the power of threat intelligence - moving from reactive to adaptive with intelligence-led securit

Download product data sheet

Solutions Brief

EclecticIQ Platform and MISP English

By integrating MISP (Malware Information Sharing Platform) into EclecticIQ Platform, not only do you benefit from MISP’s strong sharing capabilities and extensive community connections, but you also leverage the analyst-centric functionality from EclecticIQ Platform.

Download Solutions Brief

Solutions Brief

PhishMe Intelligence and EclecticIQ Platform English

With PhishMe Intelligence and EclecticIQ Platform, security teams have unobstructed views into credible phishing threats leading to higher confidence in the action based on the indicators.

Download Solutions Brief

Infographic

EclecticIQ Platform implementation chart English

This chart highlights the 5-steps to implement EclecticIQ Platform, the analyst-centric threat intelligence platform, in your organization.

Download chart

Product description

EclecticIQ Fusion Center - Product description English

With EclecticIQ Fusion Center, you can see the value of your intelligence investment and are assured of receiving an optimized, fully fused feed of the latest threat intelligence relevant to you. This makes prioritization of your downstream security processes more effective. EclecticIQ Fusion Center maximizes the business value of CTI.

Download product description

Product datasheet

EclecticIQ Fusion Center - Adversary Centric Intelligence Bundle English

Prioritize your security efforts based on the adversaries most likely to affect your organization

Download product data sheet

Product datasheet

EclecticIQ Fusion Center - Critical Infrastructure Intelligence Bundle English

Consolidated threat intelligence with a user-friendly taxonomy for a highly bespoke market

Download product data sheet

Product datasheet

EclecticIQ Fusion Center - Financial Crime Intelligence Bundle English

Cutting through the noise with structured intelligence to enhance your security posture.

Download product data sheet

Product datasheet

EclecticIQ Fusion Center - Intelligence Essentials English

Jumpstart a high-quality, cost-effective threat intelligence practice

Download product data sheet

Product datasheet

EclecticIQ Fusion Center - Victim Centric Intelligence Bundle Data Sheet English

Minimizing the impact of an attack with active research, context and cross-referenced insights

Download product data sheet

Webinar recording

EclecticIQ Fusion Center Intelligence Essentials - introduction webinar 13-Dec-2017 English

Introductory webinar to EclecticIQ Fusion Center Intelligence Essentials including a demonstration of integration with Splunk SIEM

Watch recording

Case study

Triage & Collaboration: Improving a major bank's cyber threat security posture English

Learn how a major bank implemented a single Threat Intelligence Platform (TIP) to support multiple lines of business across its global footprint.

Download Case Study

Case study

Упорядочивание данных и Организация обмена информацией. Повышение защищенности крупного банка от киберугроз Russian

Learn how a major bank implemented a single Threat Intelligence Platform (TIP) to support multiple lines of business across its global footprint.

Download Case Study

White paper

A Stakeholder-Centric Approach to Building a Cyber Threat Intelligence (CTI) practice English

How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.

Download White Paper

White paper

Applying the Threat Intelligence Maturity Model to your organization English

This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.

Download White Paper

White paper

Оценка уровня зрелости Вашей организации в области анализа разведданных о киберугрозах Russian

This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.

Download White Paper

White paper

Accelerate Incident Response with Threat Intelligence English

This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.

Download White Paper

White paper

Повышение скорости реагирования на инциденты с помощью использо- вания разведданных о киберугрозах Russian

This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.

Download White Paper

White paper

Augment your SOC with human-led threat intelligence English

Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.

Download White Paper

White paper

STIX 2.1 - Build your own intelligence English

This White Paper introduces STIX 2.1, compares it with the existing STIX 1.2 architecture and shows the future for STIX 2.x.

Download White Paper

White paper

Using a Robust Platform for Training Purposes English

Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.

Download white paper

Analyst report

Toward a Holistic Cyber Threat Intelligence (CTI) Program English

Report by Enterprise Strategy Group (ESG) Jon Oltsik, Senior Principal Analyst on operationalizing Cyber Threat Intelligence through a holistic approach [Aug-2017].

Download Analyst Report

Point of View

The future of Cyber Threat Intelligence? A "community of communities" English

Don’t map the threat landscape by yourself. Instead, talk to the intelligence communities of countries, industries and commercial fusion centres using industry standards STIX and TAXII.

Download Point of View

Webinar recording

How to overcome the Threat Intelligence Cycle Paralysis? EclecticIQ Webinar 30-Nov-2017 English

Demonstration on how to overcome threat intelligence paralysis by using a ransomware campaign and botnet threat, by providing context through their relationships with each other and additional threats.

Watch recording

Threat Intelligence Report

Fusion Center Report: US Midterm Elections 2018 Situational Awareness English

The Midterm Elections in the US are due to take place on 6th November 2018. In light of allegations of interference in previous campaigns, this report will focus on risks and identified activity that may be occurring to influence the result of the elections.

Download report and STIX entities

Threat Intelligence Report

Fusion Center Report: OpenEMR - Multiple Security Flaws Could Put Medical Records at Risk English

Researchers at Project Insecurity identified more than 30 bugs in OpenEMR, the world’s most popular open source software for managing medical records.

Download report and STIX entities

Threat Intelligence Report

Fusion Center Report: SegmentSmack - Linux Kernel TCP Vulnerability English

The Linux kernel, versions 4.9+, is vulnerable to denial of service conditions with low rates of specially crafted packets. This is being tracked as SegmentSmack, the CVE is CVE-2018- 5390.

Download report and STIX entities

Threat Intelligence Report

Fusion Center Situational Awareness Report - European Central Bank Meeting English

The European Central Bank governing council will meet on the 26th of July to discuss European monetary policy. This report will examine some of the potential threats to the ECB.

Download report and STIX entities

Threat Intelligence Report

Fusion Center Report: Uptick in Ethereum and Bitcoin Phishing Domains English

EclecticIQ analysts identified at least 25 recently registered phishing domains impersonating legitimate Ethereum or Bitcoin exchanges, cryptocurrency airdrop giveaway sites, or cryptocurrency trading sites.

Download report and STIX entities

Threat Intelligence Report

Fusion Center Report: Situational Awareness - North Korean Cyber After Singapore Summit English

The mid-June Singapore summit between the U.S.and North Korean officials have led analysts to speculate on whether or not we are likely to see a continuation or a pause in North Korean cyber actions, and whether or not that would be damaging to the recent diplomacy that came out of the summit.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Report: Targeted Attacks Against Russian Service Center English

Fortinet reported about a series of attacks targeted at service centers in Russia. The service centers provide maintenance and support for a variety of electronic goods.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Analysis: FIFA World Cup 2018 Threat Landscape English

In preparation for the 2018 World Cup hosted in Russia from June 14 - July 15, EclecticIQ Fusion Center analysts identified several categories of potential threats and activities that could impact the threat landscape leading up to and during the World Cup.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Possible APT33 Return Adds to Uptick in Iranian Activity English

In the same week as spotting fresh Intrusion Set: Greenbug activity, EclecticIQ analysts have observed a number of malware samples in the wild from fellow Iranian espionage group Intrusion Set: APT33.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: ScrapedIn LinkedIn Scraper Released on GitHub English

A Red Team Engineer posted a new tool on GitHub, ScrapedIn, that can scrape LinkedIn profiles and put the results into an Excel Spreadsheet.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: ComboJack Malware Alters Clipboards to Steal Cryptocurrency English

Unit 42 researchers discovered a new currency stealer dubbed "ComboJack", which targets cryptocurrencies and online wallets.

Download report and STIX entities

Threat Intelligence Report

Report - EclecticIQ Hypotheses: Infection Vector for German Government Breach English

On 28th February the German Interior Ministry confirmed that it identified an attack against its servers in December 2017. In this report EclecticIQ Fusion Center analysts will summarize what is known to date and will provide a set of hypotheses about the infection vector.

Download report and STIX entities

Threat Intelligence Report

Large Lokibot Malspam Campaign Hitting The UK English

Malware: LokiBot malware is actively being distributed via a spam email campaign in the UK.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Analysis: Trend in Android Trojans Targeting the Middle East English

There have been numerous instances of Android Trojans being used for espionage purposes targeting users in the Middle East in recent months. The highest profile of these include; FrozenCell, GnatSpy, AnubisSpy, Pallas and Tempting Cedar.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Malware Steals Data Directly from the Device to Hack Facebook Accounts English

A new Android malware named Malware: Android.Fakeapp extracts user credentials directly from the victim's devices, most of which have been found to be located in the Asia-Pacific region.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: DDoS Attack Stemming from Memcached Servers Hits GitHub English

Earlier this week Cloudflare and various security researchers were reporting on an obscure amplification attack vector using the memcached protocol, coming from UDP port 11211. On Wednesday. GitHub experienced a DDoS attack stemming from memcached servers.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Annabelle Ransomware (Update) English

Security researchers have identified a new ransomware, named after the horror movie "Annabelle", which showcases a number of traditional ransomware features. This report details the observations seen by EclecticIQ Fusion Center analysts.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Thanatos Ransomware First Ransomware to Ask for Payment in Bitcoin Cash English

Researchers identified a new ransomware, Thanatos, that still appears to contain a lot of bugs but is the first ransomware seen to ask for payment to be made in Bitcoin Cash (BCH).

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Hacker Group Makes $3 Million by Installing Monero Miners on Jenkins Servers English

A group of actors hacked into Jenkins servers and installed a malware that mines for Monero. This operation resulted in the theft of approximately $3 million (USD).

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Olympic Destroyer - Various Firms Attempt to Attribute English

Talos reported about Malware: Olympic Destroyer samples. Researchers noted that of the analyzedsamples, it appeared to perform only destructive functionality. From previous attacks, inclusion of destructive capabilities may add additional meaning, in terms of targeting, campaign goals, and attribution.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Russian Hacking Group Fancy Bear Prepares to Attack Winter Olympics, U.S. Senate English

The hacking group Threat Actor: Fancy Bears Hack Team, which is heavily linked to the Russian government, appears to be preparing to disrupt the 2018 Winter Olympics in South Korea.

Download report and STIX entities

Threat Intelligence Report

EclecticIQ Fusion Center Report: Pyeongchang 2018: Summary of Cyber and Physical Threats English

In preparation for the 2018 Olympic Winter Games travelers are reminded to be aware of cybersecurity and physical security risks. Cyber criminals may attempt to steal PII or harvest credentials for financial gain.

Download report and STIX entities