serrastusbear

RISE_Resources

Feb 1st, 2023
189
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.47 KB | Cybersecurity | 0 0
  1. “OpenIOC: Back to the Basics” – Will Gibb & Devon Kerr, Mandiant (https://www.mandiant.com/resources/openioc-basics)
  2.  
  3. "OpenIOC Series: Investigating with Indicators of Compromise Part I" - Devon Kerr & Will Gibb, Mandiant (https://tagteam.harvard.edu/hub_feeds/4280/feed_items/2841563)
  4.  
  5. "Investigating with Indicators of Compromise - Part II" - Will Gibb, Mandiant (https://web.archive.org/web/20201002151008/https://www.fireeye.com/blog/threat-research/2014/03/investigating-indicators-compromise-iocs-part-ii.html)
  6.  
  7. "The Origin of the Term Indicator of Compromise" - Richard Bejtlich (https://taosecurity.blogspot.com/2018/11/the-origin-of-term-indicators-of.html)
  8.  
  9. “Misunderstanding Indicators of Compromise” - Dave Dittrich & Katherine Carpenter (https://threatpost.com/misunderstanding-indicators-of-compromise/117560/)
  10.  
  11. “Indicators and Network Defense” – Joe Slowik (https://pylos.co/2018/05/16/indicators-and-network-defense/)
  12.  
  13. “Formulating a Robust Pivoting Methodology” – Joe Slowik, DomainTools (https://www.domaintools.com/content/formulating-a-robust-pivoting-methodology.pdf)
  14.  
  15. “Analyzing Network Infrastructure as Composite Objects” – Joe Slowik, DomainTools (https://www.domaintools.com/resources/blog/analyzing-network-infrastructure-as-composite-objects)
  16.  
  17. “Threat Intelligence and the Limits of Malware Analysis” – Joe Slowik, Dragos (https://www.dragos.com/wp-content/uploads/Threat-Intelligence-and-the-Limits-of-Malware-Analysis.pdf)
  18.  
Advertisement
Add Comment
Please, Sign In to add comment