true
CryptoLocker Deep-Dive: Why We Use Bitcoin Addresses as an IOC Follow the Money: Tracking Adversaries Through the Blockchain WhiteRabbit is an open source research tool we're debuting at Black Hat and DEF CON ... Read More
Introducing TruSTAR’s New Source Scoring Model Having confidence in your intelligence sources is essential to running successful security operations. But measuring the effectiveness of how your ... Read More
Improved Enclave Filter View Since launching Marketplace in January we have been collecting feedback to improve user experience. Read More
Our New Automated Whitelisting Capability False positives waste time. At TruSTAR, our mission is to empower analysts to make smarter decisions faster about where to focus precious ... Read More
An Introduction to Machine Learning Through URL Whitelisting By Nicolas Ksieb and Ivan Aguilar Read More
The Machine Learning Model Behind Project Splinter In this project summary, we walk you through how we built the machine learning algorithms behind our RAT prediction tool Project Splinter.  Read More
Increase Your Chances of Catching a RAT In July Fidelis Cybersecurity released their Barncat Intelligence Data to security researchers and the research team at TruSTAR decided to take a ... Read More
Using Graph Models to Make the Case for Greater Cyber Security Incident Collaboration When the renowned mathematician Euler first used graph theory in 1736 to solve the problem of the seven bridges of Königsberg he was trying to solve ... Read More