true
Blog Dark Reading Threat Dashboard Series | Block Threats Faster: Pattern Recognition in Exploit Kits

Dark Reading Threat Dashboard Series | Block Threats Faster: Pattern Recognition in Exploit Kits

Block Threats Faster: Pattern Recognition in Exploit Kits is the second of a series of threat intelligence dashboard articles developed by TruSTAR and Dark Reading. The full analysis is hosted on Dark Reading.

Thanks for reading our Pattern Recognition in Exploit Kits briefing. To help you investigate this trend further on your own, we’ve provided a .txt file for download of all relevant IOCs to the analysis we have observed on TruSTAR’s threat intelligence platform.

Take a look at our analyst tracking the migration from Angler to RIG exploit kits using the TruSTAR graph visualization tool:

If you have any questions about this research, don’t hesitate to send our Data Science Unit a note via support@trustar.co.

Interested tracking Exploit Kits within your organization? Download TruSTAR's list of trending IOCs.

Download Trending Exploit Kit IOCs

 Thanks for reading and happy hunting!

Black Hat 2019 Recap: Strategies for Understanding Your Attacker   Read More
CSA Security Update Podcast: TruSTAR CEO Paul Kurtz on the Value of Information Sharing on Threat Intelligence   TruSTAR’s CEO and co-founder Paul Kurtz recently appeared on Cloud Security Alliance’s podcast, CSA Security Update, and sat down with podcast host ... Read More
TruSTAR Sits Down With the Shape Security's Director of Engineering to Discuss Fraud & Account Takeover Trends The TruSTAR team recently had the opportunity to sit down with Jarrod Overson, the Director of Engineering at Shape Security. Jarrod, an expert in ... Read More
Intelligence Management and Gartner's SOAR: Thinking About Workflow First Gartner's Security Orchestration Automation and Response (SOAR) market category was announced in November 2017, and since then we've seen numerous ... Read More