Introduction
Last updated
Was this helpful?
Last updated
Was this helpful?
Information Sharing and Analysis Centers (ISACs), are used to share and exchange various Indicators of Compromise (IOCs) to obtain threat intelligence. IOCs can include MD5s, IPs, YARA rules, and more. There are many ISACs that can be used to gather threat intelligence including AlienVault OTX, Threat Connect, and MISP.
Malware and IOCs used in this room have been sourced from The Zoo Malware Repository. All credit goes to the respective owners.
Warning: This room uses neutered malware in a virtual environment, exercise caution when interacting with samples.
For future updates and rooms, follow @Cryillic on Twitter.