Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
threatintelligence
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Threat Intelligence Platform: How Modern Organizations Stay Ahead of Cyber Threats
Boris Gigovic
Boris Gigovic
Boris Gigovic
Follow
Jan 12
Threat Intelligence Platform: How Modern Organizations Stay Ahead of Cyber Threats
#
ransomware
#
cybertraining
#
threatintelligence
#
siemintegration
1
 reaction
Comments
Add Comment
6 min read
The Disclosure Theater: Why Our Vulnerability Management Is Built on a Fantasy
ZB25
ZB25
ZB25
Follow
Jan 9
The Disclosure Theater: Why Our Vulnerability Management Is Built on a Fantasy
#
vulnerabilitymanagement
#
cybersecurity
#
threatintelligence
#
vmware
Comments
Add Comment
6 min read
The Cybersecurity Industry's Deception Problem: When Defense Becomes Theater
ZB25
ZB25
ZB25
Follow
Jan 4
The Cybersecurity Industry's Deception Problem: When Defense Becomes Theater
#
cybersecurity
#
threatintelligence
#
honeypots
#
securityethics
Comments
Add Comment
6 min read
Threat Intelligence Automation with AI/ML
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Threat Intelligence Automation with AI/ML
#
ai
#
machinelearning
#
threatintelligence
Comments
Add Comment
6 min read
Advanced Threat Hunting Techniques: Part 1
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Advanced Threat Hunting Techniques: Part 1
#
threathunting
#
anomalydetection
#
behavioralanalytics
#
threatintelligence
Comments
Add Comment
8 min read
Advanced Threat Hunting Techniques: Part 2
Emanuele Balsamo
Emanuele Balsamo
Emanuele Balsamo
Follow
for
CyberPath
Jan 2
Advanced Threat Hunting Techniques: Part 2
#
threathunting
#
mitreattack
#
threatintelligence
Comments
Add Comment
8 min read
The Honeypot Paradox: How Cybersecurity's Deception Games Are Poisoning the Well
ZB25
ZB25
ZB25
Follow
Jan 4
The Honeypot Paradox: How Cybersecurity's Deception Games Are Poisoning the Well
#
cybersecurity
#
threatintelligence
#
honeypots
#
securitystrategy
Comments
Add Comment
6 min read
Threat Intelligence Feeds Are Broken — And We’re Fixing the Trust Problem No One Talks About
Syed Ali
Syed Ali
Syed Ali
Follow
Oct 4 '25
Threat Intelligence Feeds Are Broken — And We’re Fixing the Trust Problem No One Talks About
#
threatintelligence
#
cybersecurity
#
opensource
#
blockchain
Comments
Add Comment
3 min read
Cyber Threat Intelligence - Collection, Analysis, and Attribution
Rafal
Rafal
Rafal
Follow
Aug 11 '25
Cyber Threat Intelligence - Collection, Analysis, and Attribution
#
threatintelligence
#
attribution
#
osint
#
aptanalysis
3
 reactions
Comments
Add Comment
2 min read
Bring Your Own Feed (BYOF): An Engineer's Guide to Effective Threat Intelligence
John Vester
John Vester
John Vester
Follow
Jul 30 '25
Bring Your Own Feed (BYOF): An Engineer's Guide to Effective Threat Intelligence
#
threatintelligence
#
sumologic
#
tutorial
#
webdev
Comments
Add Comment
7 min read
Deep Dive: Assembly Language Security Vulnerabilities and Mitigations in Modern Systems
Shankar Aryal
Shankar Aryal
Shankar Aryal
Follow
Jan 8 '25
Deep Dive: Assembly Language Security Vulnerabilities and Mitigations in Modern Systems
#
security
#
assembly
#
threatintelligence
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
STIX & TAXII - Complete Knowledge
Dimitar
Dimitar
Dimitar
Follow
Mar 28 '22
STIX & TAXII - Complete Knowledge
#
stix
#
taxii
#
cybersecurity
#
threatintelligence
5
 reactions
Comments
Add Comment
4 min read
Honeypot Deployment and Customization
Mat
Mat
Mat
Follow
Nov 24 '20
Honeypot Deployment and Customization
#
malware
#
honeypot
#
threatintelligence
#
security
7
 reactions
Comments
Add Comment
7 min read
What are Honeypots and why do I want them?
Mat
Mat
Mat
Follow
Jun 19 '20
What are Honeypots and why do I want them?
#
malware
#
honeypot
#
threatintelligence
#
security
4
 reactions
Comments
Add Comment
3 min read
Sending your Threat Indicators to Azure Sentinel
Mark Foppen
Mark Foppen
Mark Foppen
Follow
Sep 30 '19
Sending your Threat Indicators to Azure Sentinel
#
mdatp
#
security
#
threatintelligence
#
graphapi
6
 reactions
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account