LAB52

2.1K posts

LAB52 banner
LAB52

LAB52

@LAB52io

(Cyber) Intelligence @ S2 Grupo #intelligence #cybint @s2grupo @securityartwork

가입일 Temmuz 2019
422 팔로잉1.7K 팔로워
LAB52 리트윗함
Nicolas Krassas
Nicolas Krassas@Dinosn·
I built an open-source library of 700+ cybersecurity skills for AI coding agents -- covers DFIR, threat hunting, cloud security, and more github.com/mukul975/Anthr…
English
60
586
3.1K
184.7K
LAB52
LAB52@LAB52io·
Check out our new post!! DRILLAPP: new backdoor targeting Ukrainian entities with possible links to Laundry Bear lab52.io/blog/drillapp-… #GRU
English
0
5
18
1.3K
LAB52
LAB52@LAB52io·
This!! 👇👇👇#mustread
Alfonso Muñoz, Phd@mindcrypt

Dear Infosec/AI and CTI community, We have released our new book, "Threat Intelligence: Chaos, Signals, and Attribution — AI Applied to Threat Intelligence," by Alfonso Muñoz and Jacobo Blancas - amazon.com/dp/B0GS3762DV I hope you can help us share it to reach as many people as possible who are interested in threat intelligence, AI applications, and cybersecurity. Here is a little bit of its description: We live in a paradox: never before have we had so much information about threats, yet we rarely have real intelligence. Reports, IOCs, feeds, malware samples, and indicators arrive constantly, often mixed with noise and inconsistent labels. For many teams, the result is an ocean of disconnected signals where urgency overwhelms what truly matters. Threat Intelligence: Chaos, Signals, and Attribution. AI Applied to Threat Intelligence addresses this challenge with a clear goal: transforming scattered data into useful, actionable, and defensible knowledge. The book argues that CTI is not simply a list of “bad things” to block but a discipline with its own cycle, methods, metrics, and cognitive biases, closely linked to business decisions and risk management. The first part establishes the foundations of CTI: its different levels (strategic, operational, tactical, and technical), the intelligence cycle, common myths, threat actors such as cybercriminal groups, APTs, and hacktivists, and the central role of modeling and attribution. The focus is on moving from repeating labels to performing real analytical work supported by structured reasoning. The second part explores the role of artificial intelligence in CTI. AI can accelerate analysis, helping classify and prioritize information at scale, summarize reports, extract TTPs from text and telemetry, correlate indicators through semantic similarity, and assist analysts through intelligent agents. At the same time, the book examines its risks, including hallucinations, adversarial manipulation, sensitive data exposure, and model supply-chain vulnerabilities. The approach is practical: it covers the collection and normalization of observables, enrichment and scoring, graph-based correlation, and intelligence sharing through standards such as TAXII. It also explores tools and platforms commonly used in CTI, including MISP, OpenCTI, and Yeti, as well as sources such as OSINT, the dark web, and messaging platforms, combined with defensive telemetry and workflows. Designed for CTI analysts, SOC teams, threat hunters, IR/DFIR practitioners, and cybersecurity professionals, the book also targets AI and ML specialists who want to apply AI to CTI with rigor, governance, and security. It provides a roadmap for turning signals into decisions and building CTI capabilities that remain robust as threats evolve.

English
0
0
3
430
LAB52
LAB52@LAB52io·
A nice present from a good friend: "In Stalin's secret service", by Walter Krivitsky (Spanish edition, "Yo, Jefe del Servicio Militar Soviético", dated 1947). Thanks!!! #GRU
LAB52 tweet media
English
0
1
12
465
LAB52
LAB52@LAB52io·
Track Iran in real-time: news sentiment, X/Twitter feeds, flight radar, prediction markets, and internet connectivity. Free open source intelligence dashboard: iranmonitor.org
English
0
2
11
1.4K
LAB52 리트윗함
Check Point Research
Check Point Research@_CPResearch_·
AI tools are now part of the attack surface. CPR demonstrated “AI as a proxy”: Grok & Copilot can be steered to fetch attacker URLs and relay C2. Pair that with AI-driven malware, and you get prompt-powered implants that adapt at runtime. research.checkpoint.com/2026/ai-in-the…
English
1
22
46
8.6K
LAB52
LAB52@LAB52io·
At least, a curious article... 👇👇👇 From Scandal to Security Threat: Protecting High-Value Individuals Named in the Epstein Files from Russian Intelligence Targeting lansinginstitute.org/2026/02/13/fro…
English
0
1
1
174