Member-only story

Intro to ISAC TryHackme

Vijay Kumar Gupta
4 min readSep 7, 2024

Introduction:-

Threat Intelligence, also known as TI and Cyber Threat Intelligence also known as, CTI, is used to provide information about the threat landscape specifically adversaries and their TTPs. Typically CTI revolves around APT groups and/or other threats, these can be well-known groups or up and coming new threats.

Data must be analyzed to be considered threat intelligence. Once analyzed and actionable, then it becomes threat intelligence. The data needs context around to become intel.

CTI is a precautionary measure that companies use or contribute to so that other corporations do not get hit with the same attacks. Of course, adversaries change their TTPs all the time so the TI landscape is constantly changing.

What are ISACs

According to the National Council of ISACs, “Information Sharing and Analysis Centers (ISACs) are member-driven organizations, delivering all-hazards threat and mitigation information to asset owners and operators”. ISACs can be community-centered or vendor-specific. ISACs include CTI from threat actors as well as mitigation information in the form of IOCs, YARA rules, etc. ISACs maintain situational awareness by sharing and collaborating to maintain CTI, through a National Council of ISACs.

--

--

Vijay Kumar Gupta
Vijay Kumar Gupta

Written by Vijay Kumar Gupta

Vijay Gupta is an inspiring public speaker and social entrepreneur who has dedicated his life to bringing about positive change and empowering communities.

No responses yet