Discover how Blueliv Cyber Threat Intelligence and ThreatQ together enable the ingestion of real-time threat intelligence to the Threat Library™ with the assurance of helping analysts identify relevant events and reduce noise.
In this Tech Session you will learn how to:
- Import IP and FQDN indicators associated with botnets and crime servers
- Ingest hashes and attributes indicating the type, family, architecture and confidence of the malware
- Create relationships between related IPs, hashes and FQDNs
- Provide valuable geolocation information for IPs and FQDNs involved in attacks, crime servers and botnets
Join Victor Acin from Blueliv and Zach Shames from ThreatQuotient to learn more.