Skip to main content

Threat Intelligence

Overview

This advanced module operates as a virtual threat analyst, continuously gathering, analyzing, and enriching threat data from various sources to provide actionable insights and proactive threat mitigation strategies. It empowers organizations to stay ahead of evolving cyber threats and make informed decisions to safeguard their critical assets.

Key Features:
  1. Threat Intelligence Dashboard: The Threat Intelligence Dashboard is a comprehensive tool that offers a visual representation of cyber threats and vulnerabilities. It includes features such as Social Network visualization, Trending, tracks mention of an organization over time and references to top industries in cyber threat reports, providing insights into potential targets. The Scanning feature provides insights into threat actors’ probing activities, while Top Scan Results highlight significant findings from these scans.

  2. Social Footprint: Social Footprint measures, manages, and reports an organization’s social sustainability performance. It helps organizations understand their social risks and impacts and communicate their social sustainability efforts effectively.

  3. Scan: The Scan feature automates the process of examining a system or network for any behavior or information that might signify a threat or vulnerability.

  4. Domain Scan: The Domain Scan tool automates the process of investigating a specific domain for potential threats or vulnerabilities.

  5. Feed: The Feed feature in a threat intelligence news feed is a real-time, continuous data stream that gathers information related to cyber risks or threats.

 

User Manual:

 

Threat Intelligence Dashboard

Click the “Threat Intelligence Module” to navigate to the TI Dashboard

TIDash.png

 

Threat Intelligence Side Navigation Menu

The Side Navigation Menu lists all the Threat Intelligence tools to gather information for the target. It includes Social Footprint, Scan, Domain Scan, and Feed.

TIN.png

 

Social Footprint

Click on Social Footprint to add a target email address to scout. This will display an example of the scanned organization’s employee email and the related social media that the user mostly visited.

Social Footprint.png

Target Email.png

 

Scan

Click Scan to set a Schedule for Scan. Add the details of the target to scan, then click submit. After scanning, view the Scan History to see previous scanned targets. Select any title in the table to view the data. Summary of the data after scanning will be displayed.

Scan

Scan.png

Schedule for Scan

SchedScan.png

Scan board

History.png

Scan history

scanhistory.png

Summary of Data

Summary od data.png

 

Domain Scan

Click Domain Scan, then click the New Scan Button. Input the Name of the target and the target domain, then click Scan Now. After the scan, click the scanned target to view the data. Data shown are the result of a scanned domain. Click on one of the correlations to view the vulnerabilities of the hosts.

DomainScan.png

New Scan Button

scanbutton.png

Target view data

Targetview.png

Scanned domain

ScannedDomain.png

Host Vulnerabilities view

VV.png

 

Feed

Click the Feed, select a cyber news site, and click View More to view the list of news on that site. Select any news to read.

Feel free to adjust the template further as needed!

VV.png

View more

feedview.png

List of News in Bleeping Computer site.

bleeping.png

Select any News

bleee.png