Block Threats Faster: Pattern Recognition in Exploit Kits is the second of a series of threat intelligence dashboard articles developed by TruSTAR and Dark Reading. The full analysis is hosted on Dark Reading.
Thanks for reading our Pattern Recognition in Exploit Kits briefing. To help you investigate this trend further on your own, we’ve provided a .txt file for download of all relevant IOCs to the analysis we have observed on TruSTAR’s threat intelligence platform.
Take a look at our analyst tracking the migration from Angler to RIG exploit kits using the TruSTAR graph visualization tool:
If you have any questions about this research, don’t hesitate to send our Data Science Unit a note via email@example.com.
Interested tracking Exploit Kits within your organization? Download TruSTAR's list of trending IOCs.
Thanks for reading and happy hunting!