How X (Twitter) Powers Early Cyber Threat Detection
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Ip Addresses - T1590.005 Malware - T1587.001 Malware - T1588.001 Social Media - T1593.001 Tool - T1588.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 6cff5414-6759-4c68-8b9a-756886fa27f3 |
Fingerprint | 8e203889239f9e89 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 22, 2024, 2:23 p.m. |
Added to db | Dec. 22, 2024, 3:36 p.m. |
Last updated | Dec. 22, 2024, 3:37 p.m. |
Headline | How X (Twitter) Powers Early Cyber Threat Detection |
Title | How X (Twitter) Powers Early Cyber Threat Detection |
Detected Hints/Tags/Attributes | 40/1/2 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |