Visual Threat Intelligence: An Illustrated Guide For Threat Researchers
C**N
Loved it!
Visual Threat Intelligence completely captivated me. With its concise yet powerful approach, this book combines visually appealing diagrams, practical examples, and real-world case studies to demystify the complex world of threat intelligence. From the fundamentals to advanced methodologies, it covers everything you need to elevate your skills.The use of visuals makes the concepts easily understandable and memorable, while the author's engaging style keeps you hooked from start to finish. I particularly enjoyed the analysis of notorious cyberattacks. It's an immersive journey that not only enhances your understanding but also equips you with practical knowledge.This guide is a must-have resource for cybersecurity enthusiasts, professionals, and anyone seeking to deepen their understanding of this field. Whether you're a beginner or an experienced practitioner, this book will empower you to enhance your threat intelligence skills and excel in your career.
C**E
More than a book: an actionable handbook!
Easy to follow and full of links to further the research. Don't think the book as a step-by-step guide but more of a general idea, just enough to get your bearings!
S**L
Outstanding overview of threat hunting
Beautifully designed book with lots of full color diagrams and outstanding technical information. Must have for anyone interested in threat hunting.
A**R
Decent domain understanding for a fresh Analyst
The book contains decent domain knowledge for understanding basic cyber security terminology and techniques but that’s all it is.
G**D
All aboard the value train! 5/5 ⭐️
🚨 Want to know real Cyber Threat Intel practices? 💥🤔. (You won’t regret reading this !👇)Just finished Thomas Roccia book “Visual Threat Intel” and All Aboard The Value Train 🚂 💥It’s BOTH a resource for active CTI / Blue analysts AND an accessible intro to the niche in the field🎉It literally breaks down:All the main concepts, practices, mindset for work in this space in a super approachable manner. 🤩Once he gives us the concepts, several high profile incidents are used as case study to show how those concepts actually look in practice. ⚒️Finally Appendices are typically where you go if you’re having trouble sleeping but this one….. holy cr💥p!The appendix is basically a framework for a cti analyst to build out a competent toolbox and massive amounts of “further reading” resources to allow you to take your cti knowledge and skill as far as you want. 🚀Expect a Simply Cyber video on this book in near future (if Thomas doesn’t mind)👏👏👏 5 / 5 stars . Thank you for this gem 💎
O**J
Great book
Awesome book, illustrated. Perfect as intro into CTI
D**M
A reference and carefully curated collection of useful computer security tools
This book is both unusual and informative for security researchers of all experience levels.Think of it as both a reference guide as well as a collection of carefully curated tools that can help infosec researchers get smarter about understanding potential threats (such as YARA, Sigma, and log analyzers) and the ways in which criminals use them to penetrate your networks.For threat intel beginners, he describes the processes involved in breach investigation, how you gather information and vet it, and weigh various competing hypotheses to come up with what actually happened across your computing infrastructure. He then builds on these basics with lots of useful and practical methods, tools, and techniques.One chapter goes into detail about the more notorious hacks of the past, including Stuxnet, the 2014 Sony hack, and WannaCry. There are timelines of what happened when, graphical representations of how the attack happened mapping the attack to the diamond model (focusing on adversaries, infrastructure, capabilities, and victims) and a summary of the MITRE ATT&CK tactics. That is a lot of specific information that is presented in a easily readable manner. I have been writing about cybersecurity for many years and haven’t seen such a cogent collection in one place of these more infamous attacks.Roccia also does a deeper dive into his own investigation of NotPetya for two weeks during the summer of 2017. “It was the first time in my career that I fully realized the wide-ranging impact of a cyberattack — not only on data but also on people,” he wrote.The book’s appendix contains a long annotated list of various open source tools useful for threat intel analysts. I highly recommend the book if you are interested in learning more about the subject and are looking for a very practical guide that you can use in your own investigations.
A**R
Both unusual and informative for security researchers of all experience levels
Think of this book as both a reference guide as well as a collection of carefully curated tools that can help infosec researchers get smarter about understanding potential threats (such as YARA, Sigma, and log analyzers) and the ways in which criminals use them to penetrate your networks.For threat intel beginners, he describes the processes involved in breach investigation, how you gather information and vet it, and weigh various competing hypotheses to come up with what actually happened across your computing infrastructure. He then builds on these basics with lots of useful and practical methods, tools, and techniques.One chapter goes into detail about the more notorious hacks of the past, including Stuxnet, the 2014 Sony hack, and WannaCry. There are timelines of what happened when, graphical representations of how the attack happened (such as the overview of the Shamoon atttack, mapping the attack to the diamond model (focusing on adversaries, infrastructure, capabilities, and victims) and a summary of the MITRE ATT&CK tactics.Roccia also does a deeper dive into his own investigation of NotPetya for two weeks during the summer of 2017. “It was the first time in my career that I fully realized the wide-ranging impact of a cyberattack — not only on data but also on people,” he wrote.
T**K
Nice if you know nothing about cti, not as visual as you may think
I bought this book based on some visuals the author made and shared on twitter. Mainly how yara and sigma rules are structures. I was hoping for more similar visualisations of technical things related to cti but unfortunately most of the book consisted of pretty rudimentary concepts. Fine in itself, just not what I expected.This is probably a very nice, clear and short introductory book for people not very familiar with the topic
R**E
Cracking book on CTI
A gripping, visually stimulating read. Provides key insights into the field without overcomplicating it with too much technical jargon. For me, absolutely spot on and it a must read for anyone new or in the field. Brilliant stuff.
C**N
Un livre à avoir pour tout Analyste CTI !
J'ai acheté le livre au format eBook le vendredi 26/05/2023 et j'ai fini de le lire le 28/05/2023, tant et si bien que ce livre tient le lecteur en haleine !Thomas présente les bases du CTI, les méthodes utilisées, comment faire des analyses, les attaques les plus impactantes de ces dernières années, son expérience personnelle et le tout avec des images pour concrétiser tous ces éléments !Je recommande vivement ce livre aux personnes du monde cyber et plus particulièrement aux personnes souhaitant travailler dans le monde du CTI (Cyber Threat Intelligence).Il nous fallait une ressource accessible à tous sur ce monde merveilleux et c'est chose faite !PS : J'ai acheté la version papier de ce même livre et reçu hier, les illustrations sont en couleurs même dans cette version ce qui n'est pas commun.
新**丈
Beyond the expectations!!
The book features a dual format with half dedicated to clear explanations through infographics and the other half delving into detailed descriptions. It proves invaluable for gaining an overall understanding in the broad field of cybersecurity. The real-life attack examples and MSTIPy infographic were particularly easy to comprehend. Highly recommended! A solid 5-star rating !!
K**R
A MUST READ for CTI
This book contains everything you need, from CTI fundamentals, to threat actors, operating models, tracking adversaries, performing threat analysis and reviewing notorious cyber attacks. It's been years since I felt it difficult to put a book down as I didn't want to stop. Each topic had an accompanying diagram which broke down complex ideas into an easily understandable representation.
Trustpilot
2 weeks ago
1 month ago