You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[NIST Special Publication 800-150 (Draft) - Guide to Cyber Threat 6 Information Sharing (Draft)](https://csrc.nist.gov/csrc/media/publications/sp/800-150/archive/2016-04-21/documents/sp800_150_draft.pdf),
*[Structured Threat Information eXpression](https://stixproject.github.io)
80
+
*[Malware Attribute Enumeration and Characterization (MAEC)](https://maecproject.github.io)
81
+
*[Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™)](https://stixproject.github.io/getting-started/whitepaper/),
-[Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits](http://users.umiacs.umd.edu/~tdumitra/papers/USENIX-SECURITY-2015.pdf),
72
+
*[Communities @ Risk - Targeted Digital Threats Against Civil Society](https://targetedthreats.net/index.html)
73
+
*[Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits](http://users.umiacs.umd.edu/~tdumitra/papers/USENIX-SECURITY-2015.pdf),
75
74
by Carl Sabottke, Octavian Suciu, Tudor Dumitras, Usenix 2015
76
75
77
76
### Analysis
78
77
79
-
-[A Forensic Overview of a Linux perlbot](http://www.sempersecurus.org/2013/12/a-forensic-overview-of-linux-perlbot.html),
78
+
*[A Forensic Overview of a Linux perlbot](http://www.sempersecurus.org/2013/12/a-forensic-overview-of-linux-perlbot.html),
80
79
by Andre M. DiMino, December 17, 2013
81
-
-[Probing into the Flash Zero Day Exploit (CVE-2014-0502)](https://www.zscaler.com/blogs/security-research),
80
+
*[Probing into the Flash Zero Day Exploit (CVE-2014-0502)](https://www.zscaler.com/blogs/security-research),
by Olivier Bilodeau, Pierre-Marc Bureau, Joan Calvet, Alexis
85
84
Dorais-Joncas, Marc-Étienne M.Léveillé, Benjamin Vanheuverzwijn,
86
85
March, 2014
87
-
-[Security Advisory 2953095: recommendation to stay protected and for detections](https://learn.microsoft.com/en-us/archive/blogs/),
86
+
*[Security Advisory 2953095: recommendation to stay protected and for detections](https://learn.microsoft.com/en-us/archive/blogs/),
88
87
by Chengyun Chu, Elia Florio, March 24, 2014
89
88
90
89
### Exploit Kit
91
90
92
-
-[What Are Exploit Kits?](https://zeltser.com/what-is-an-exploit-kit/),
91
+
*[What Are Exploit Kits?](https://zeltser.com/what-is-an-exploit-kit/),
93
92
by Lenny Zeltser, October 26, 2010
94
-
-[The four seasons of Glazunov: digging further into Sibhost and Flimkit](https://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/),
93
+
*[The four seasons of Glazunov: digging further into Sibhost and Flimkit](https://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/),
-[Many ways of malware persistence (that you were always afraid to ask)](https://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html),
99
+
*[Many ways of malware persistence (that you were always afraid to ask)](https://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html),
0 commit comments