Dec. 21, 2022, 2:10 a.m. | Peng Gao, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song

cs.CR updates on arXiv.org arxiv.org

Despite the increased adoption of open-source cyber threat intelligence
(OSCTI) for acquiring knowledge about cyber threats, little effort has been
made to harvest knowledge from a large number of unstructured OSCTI reports
available in the wild (e.g., security articles, threat reports). These reports
provide comprehensive threat knowledge in a variety of entities (e.g., IOCs,
threat actors, TTPs) and relations, which, however, are hard to gather due to
diverse report formats, large report quantities, and complex structures and
nuances in the …

automated cyber cyber threat cyber threat intelligence intelligence intelligence gathering management threat threat intelligence

GCP Incident Response Engineer

@ Publicis Groupe | Dallas, Texas, United States

DevSecOps Engineer - CL - Santiago

@ Globant | Santiago de Chile, Santiago, CL

IT Security Analyst - State Government & Healthcare

@ NTT DATA | Little Rock, AR, US

Exploit Developer

@ Peraton | Fort Meade, MD, United States

Senior Manager, Response Analytics & Insights (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M3C0N5

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | Buffalo, NY, United States