Latest Reports

Latest Threat Analysis Reports

blog image

Threat Intel Roundup: Linux, FishEye, Jia Tan’s, Zer0con

Week in Overview(2 Apr-9 Apr) – 2024 Technical Summary 🚨 Vulnerability of the Week A critical vulnerability, CVE-2024-1086, has surfaced,

More
blog image

Threat Intel Roundup: XZ, Konni, ALPC, WallEscape

Technical Summary 5. Android Malware Vultur Expansion: 6. WallEscape Vulnerability in util-linux (CVE-2024-28085): 7. Chaining N-days to Compromise All: Windows

More
blog image

Threat Intel Roundup: Pwn2Own, MDAV, FakeJami, ColdFusion

Week in Overview(19 Mar-26 Mar) – 2024 Technical Summary 1.Pwn2Own Vancouver 2024: Pwn2Own Vancouver 2024 showcased the skills of cybersecurity

More

Sensors

Discover And Gather Information

Sensor Intelligence

ability of sensors to collect, process, analyze, and interpret data to make informed decisions and take actions based on that information. 

Human Intelligence

ability of the human mind to understand, reason, learn, perceive, solve problems, think abstractly, comprehend complex ideas, and learn from experience. 

Vulnerability Intelligence

The knowledge and information about security vulnerabilities in systems that organizations use to protect against cyber threats. 

Malware Intelligence

Malware intelligence refers to the information and knowledge about malware, including its behavior, characteristics, origin, and impact. 

Data Intelligence

The process of collecting, integrating, analyzing, and interpreting data to make informed decisions and take actions based on that information. 

Open Source Intelligence

The process of collecting and analyzing publicly available information to support decision-making. It encompasses a wide range of information sources.

Iot Intelligence

The process of collecting, analyzing, and utilizing data from Internet of Things (IoT) devices and systems to gain insights, make decisions, and take actions.

Contact Us

Drop Us A Message For Any Query

..