Today > vulnerabilities   -   You can now download lists of IOCs here!

How to Improve Cyber Threat Investigations with TI Lookup

Nov. 13, 2024, 12:28 p.m.

Description

This article discusses the use of Threat Intelligence (TI) Lookup, a centralized service for threat data exploration and analysis. It highlights key features such as fast search results, extensive search parameters, and access to a large database of malware and phishing samples. The article explains how TI Lookup sources data from public submissions and provides several use cases, including checking suspicious IP addresses, identifying malware families using mutexes, uncovering threats using file paths, connecting unrelated data points, and collecting fresh samples with YARA rules. The tool's ability to provide quick results and offer a wide range of search options makes it valuable for cybersecurity professionals.

Date

Published: Nov. 13, 2024, 10:59 a.m.

Created: Nov. 13, 2024, 10:59 a.m.

Modified: Nov. 13, 2024, 12:28 p.m.

Attack Patterns

DarkVision

Remcos

Lumma

Stealc

AgentTesla

T1082

T1057

T1083

T1071

T1102

T1204

T1027

T1112

T1566

T1059