Back to fields

CTI

Threat intelligence

CTI helps read technical indicators in context and turn them into defensive decisions. The workflows here focus on passive checking, verification, and reporting.

First steps

  1. Name the indicator type: domain, IP, URL, hash, or CVE.
  2. Collect date and context from passive sources.
  3. Write the false-positive risk.
  4. Recommend a defensive action with confidence.

Limits

  • No exploit or proof-of-concept execution guidance.
  • Do not test systems without authorization.
  • Do not download or run suspicious files on your main system.

What this field covers

A quick scope view.

IOC checks

CVE verification

Domain and IP reputation

Malware-report reading

Defensive notes

Related source collections

Good places to start in this field.

Open the full directory