tl;dr| dogesec
A post full of code examples that will give you everything you need to start creating STIX objects to make it simple to share your threat research.| dogesec
If you’re a cyber threat intelligence analyst you probably use txt2stix, but do you know everything it’s currently capable of?| dogesec
txt2stix + stix2arango + arango_taxii_server = a robust and flexible setup for storing and distributing cyber threat intelligence you’ve produced.| dogesec
Discover how MITRE ATLAS is helping to defend AI systems as I share a detailed explanation of how the knowledge-base is architected.| dogesec
Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
STIX 2.1 allows you to tell stories by connecting objects together to form the story-line of cyber actors, campaigns, incidents, and much more. In this post I explain how.| dogesec
Here is a quick-start guide to CTI Butler showing you how much easier it makes working with these frameworks.| dogesec
Despite countless frameworks, best practices, blog posts… so many developers still hardcode credentials into their code.| dogesec
Follow along as I show you how to store 200,000 CVEs as STIX objects, then use CVSS, EPSS, CISA KEV and CPE data to search and filter them.| dogesec
Turn card numbers into STIX 2.1 objects. Enrich the data with issuer information. Track transactions made by the card. Then link the cards and transactions to other STIX objects in your research (Actors, Incidents, etc.).| DOGESEC
I recently conducted a project to identify the most prolific ransomware based on the ransom payments being made. Let me walk you through how I did it.| DOGESEC
Take the list of recognised countries and regions. Create STIX objects for them. Make them available to everyone so that the CTI world has a single way of representing them.| DOGESEC