diff --git a/README.md b/README.md index bba0d91..8648ab1 100644 --- a/README.md +++ b/README.md @@ -85,7 +85,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea - BruteForceBlocker + BruteForceBlocker BruteForceBlocker is a perl script that monitors a server's sshd logs and identifies brute force attacks, which it then uses to automatically configure firewall blocking rules and submit those IPs back to the project site, http://danger.rulez.sk/projects/bruteforceblocker/blist.php. @@ -285,7 +285,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea - HoneyDB + HoneyDB HoneyDB provides real time data of honeypot activity. This data comes from honeypots deployed on the Internet using the HoneyPy honeypot. In addition, HoneyDB provides API access to collected honeypot activity, which also includes aggregated data from various honeypot Twitter feeds. @@ -355,10 +355,6 @@ Continuously updated and inform your business or clients about risks and implica Probable Whitelist of the top 1 million web sites, as ranked by Majestic. Sites are ordered by the number of referring subnets. More about the ranking can be found on their blog. - - Malc0de DNS Sinkhole - The files in this link will be updated daily with domains that have been indentified distributing malware during the past 30 days. Collected by malc0de. - Maldatabase @@ -1900,7 +1896,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r - Threat Intelligence: Collecting, Analysing, Evaluating + Threat Intelligence: Collecting, Analysing, Evaluating This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity. @@ -1932,7 +1928,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r - Who's Using Cyberthreat Intelligence and How? + Who's Using Cyberthreat Intelligence and How? A whitepaper by the SANS Institute describing the usage of Threat Intelligence including a survey that was performed. diff --git a/docs/mwr-threat-intelligence-whitepaper.pdf b/docs/mwr-threat-intelligence-whitepaper.pdf new file mode 100644 index 0000000..bcabe9c Binary files /dev/null and b/docs/mwr-threat-intelligence-whitepaper.pdf differ diff --git a/docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf b/docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf new file mode 100644 index 0000000..c4f89bd Binary files /dev/null and b/docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf differ