CTI Guide 2025
CTI Guide 2025
Malicious Email? SQL ATTACK AGAINST THE HOW LONG CAN I REMAIN
DATABASE? UNDETECTED?
[ Knowing our enemy can help us to better defend our systems ] linkedin.com/in/harunseker
Core Skills required for CTI
1 Threat Analysis and Research 5 AI and Machine Learning
● Advanced data analysis techniques ● Leveraging AI for faster threat detection and predictive capabilities
● Proficiency in threat actor profiling 6 Cloud Security
● Ability to identify patterns in complex datasets ● Expertise in securing multi-cloud environments
2 Technical Expertise 7 IoT Security
● Understanding of networking protocols, firewalls, and
intrusion detection systems ● Understanding vulnerabilities in IoT devices and embedded systems
● Malware analysis and reverse engineering skills 8 Dark, Deep, and Surface Web Monitoring
● Forensic techniques ● Proficiency in using specialized tools for dark web monitoring
3 Communication and Reporting ● Understanding the structure and navigation of the dark web
● Ability to gather and analyze threat intelligence from various web
● Writing clear and concise intelligence reports layers
● Translating technical findings for non-technical ● Knowledge of dark web marketplaces, forums, and communication
stakeholders channels
4 Continuous Learning
Staying updated on the latest cybersecurity trends and
technologies
linkedin.com/in/harunseker
Key Concepts and Frameworks
● The Intelligence Life Cycle ● SIGMA
● Cyber Kill Chain ● STIX/TAXII : Standardized threat information exchange
● Diamond Model ● Traffic Light Protocol (TLP)
● Pyramid Of Pain ● Logical Fallacies and Cognitive Biases
● Proactive Threat Hunting
○ Identifying and neutralizing potential threats before they
● Indicators of Compromise - IoCs materialize
● YARA
linkedin.com/in/harunseker
What is Cyber Threat Intelligence?
Cyber Threat Intelligence (CTI) is a subfield of cybersecurity that focuses
on the structured collection, analysis, and dissemination of data
regarding potential or existing cyber threats.
● Unknown unknowns represent threats or vulnerabilities ● Continuous monitoring and analysis of the threat landscape
that an organization is not aware of and cannot ● Proactive threat hunting to uncover hidden risks
anticipate. ● Leveraging advanced technologies and methodologies to identify
● The goal is to identify these hidden risks and convert
emerging threats
them into known threats that can be addressed.
linkedin.com/in/harunseker
What is Extended Threat Intelligence?
SOCRadar calls their approach Extended Threat Intelligence (XTI) because it combines
three key components:
1. Cyber Threat Intelligence (CTI)
2. Digital Risk Protection (DRP)
3. External Attack Surface Management (EASM)
This extended approach aims to provide a more comprehensive and proactive security
posture. SOCRadar's philosophy is that providing only threat intelligence is not
sufficient for full-fledged proactive security. By combining these three elements,
SOCRadar aims to help security teams detect blind spots before attackers can exploit
them.
linkedin.com/in/harunseker
The Intelligence Life Cycle
linkedin.com/in/harunseker
Cyber Kill Chain
A model developed by Lockheed Martin that describes the stages of a
cyber attack: Reconnaissance, Weaponization, Delivery, Exploitation,
Installation, Command and Control (C2), and Actions on Objectives. It
helps security teams understand and interrupt the attack process.
linkedin.com/in/harunseker
Diamond Model
A framework for analyzing cyber incidents using four core
features: Adversary, Infrastructure, Capability, and Victim. It helps
analysts understand the relationships between these elements
and provides a comprehensive view of an attack.
linkedin.com/in/harunseker
Pyramid Of Pain
linkedin.com/in/harunseker
Indicators of Compromise - IoCs
Indicators of Compromise (IoCs) are critical artifacts or evidence that suggest a breach or
malicious activity has occurred within an information system. They serve as signals of potential
cyber threats and can take various forms, including:
● File Hashes
● IP Addresses
● Domain Names
● URLs
● Email Addresses
● Registry Keys
● Network traffic patterns
IoCs help cybersecurity professionals to detect, respond to, and mitigate cyber threats effectively.
▶Understanding Indicators of Compromise for Incident Response
https://www.youtube.com/watch?v=zs-AEaSd2vk
▶ Pyramid of Pain and Indicator of compromise
https://www.youtube.com/watch?v=nQXtAv7EDrw
linkedin.com/in/harunseker
MITRE ATT&CK
MITRE ATT&CK is a guide that helps people understand and stop computer hackers by listing the different methods these
hackers use. It's like a playbook that shows how to catch and block the bad guys in the digital world.interactive mitre
attack framework. According to the latest information from the MITRE ATT&CK framework, as of April 2024 (version 15),
the framework contains:
● 14 Tactics
● 202 Techniques
● 435 Sub-Techniques
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It provides a
common language for describing cyber attacks and helps organizations improve their security posture.
📘 "MITRE ATT&CK™: Design and Philosophy" by Blake Strom, et al.
A thorough exploration of the MITRE ATT&CK framework.
▶ The Anatomy of an ATT&CK https://www.youtube.com/watch?v=2icKi2q6NS4
▶ MITRE ATT&CK Framework for Beginners https://www.youtube.com/watch?v=GYyLnff2XRo
▶ Workshop: MITRE ATT&CK Fundamentals https://www.youtube.com/watch?v=1cCt2XZr2ms
linkedin.com/in/harunseker
Courses of Action Matrix
A tool used to map out potential responses to
different types of cyber threats. It helps
organizations prepare and quickly respond to
various attack scenarios.
linkedin.com/in/harunseker
YARA
A tool used to create pattern-matching rules for malware detection. It allows analysts to create descriptions of malware
families based on textual or binary patterns.
▶ What are Yara Rules (and How Cybersecurity Analysts Use Them)
https://www.youtube.com/watch?v=BM23_H2GGMA
📘 Writing YARA rules
https://yara.readthedocs.io/en/stable/writingrules.html
linkedin.com/in/harunseker
SIGMA
Sigma is a generic and open signature format that allows you to describe relevant log
events straightforwardly. The rule format is flexible, accessible to write, and applicable
to any log file. The primary purpose of this project is to provide a vendor-neutral
structured format in which researchers or analysts can describe their detection
methods and make them shareable with others, which can be converted using the
online resource uncoder.io and applied to different SIEMs and detection platforms.
https://github.com/Neo23x0/sigma
https://github.com/SigmaHQ/sigma
linkedin.com/in/harunseker
STIX / TAXII
STIX (Structured Threat Information eXpression) is a standardized language for sharing threat intelligence. TAXII (Trusted
Automated eXchange of Intelligence Information) is the protocol used to exchange STIX data between parties.
linkedin.com/in/harunseker
Traffic Light Protocol (TLP)
A set of designations used to ensure that sensitive information
is shared with the appropriate audience.
It uses four colors: RED (restricted), AMBER (limited
disclosure), GREEN (community-wide), and WHITE (unlimited).
https://envisionit.com/resources/articles/the-traffic-light-protocol-simplifyi
ng-sensitivity-labels-in-microsoft-365
linkedin.com/in/harunseker
Logical Fallacies and Cognitive Biases
linkedin.com/in/harunseker
Proactive Threat Hunting
Identifying and neutralizing potential threats before they materialize. A cybersecurity practice that actively searches for
hidden threats within a network, rather than waiting for alerts. It involves hypothesis-driven investigations and advanced
analytics to uncover sophisticated attacks.
linkedin.com/in/harunseker
Extended Threat Intelligence (XTI)
As an Extended Threat Intelligence (XTI) platform and inventor of the
concept, SOCRadar's approach is to effectively combine Cyber Threat
Intelligence (CTI), Digital Risk Protection (DRP) External Attack Surface
Management (EASM) and Supply Chain Intelligence .
linkedin.com/in/harunseker
Zero-Trust Principles
A security model that assumes no user,
device, or network is trusted by default.
https://zeronetworks.com/blog/what-is-zero-trust-security-without-the-marketing-bs
linkedin.com/in/harunseker
Key Responsibilities of a CTIA
LevelBlue Labs
Cyber Threat Intelligence Analyst
A Cyber Threat Intelligence Analyst plays a crucial role in safeguarding organizations from cyber threats
by collecting, analyzing, and reporting on threat data. Here are the key responsibilities of a Cyber Threat
Intelligence Analyst:
Data Collection: Gather raw data from various sources, including the dark Problem Solving: Develop innovative solutions to complex security
web, intelligence feeds, and other intelligence sources. problems, often requiring a creative approach to threat mitigation.
Continuous Learning: Stay updated with the latest cybersecurity trends,
Threat Analysis: Analyze collected data to understand the technical aspects threats, and technologies to enhance threat detection and response
of security and assess the level of threat posed by attacks. capabilities.
Threat Monitoring: Continuously monitor indicators of compromise (IOCs) Business Risk Identification: Identify business risks and refine information
and assess potential threats to the organization's networks and data. into intelligence that is disseminated to higher-level business executives.
Intelligence Reporting: Prepare and present intelligence reports that Understanding Adversaries: Understand the motive of adversaries by
highlight key findings and propose counteractions to mitigate threats. analyzing the characteristics and habits of threat actors.
Threat Prioritization: Prioritize threats based on severity and potential Guide Defense Strategies: Guide organizations in building effective
impact, focusing on the most critical ones. defense and mitigation strategies.
Collaboration and Communication: Collaborate with IT, incident handling, Extracting Threat Intelligence: Extract threat intelligence that includes
and SOC teams by generating timely threat reports and effectively contextual information, IOCs, TTPs, consequences, and actionable
communicating findings and recommendations to stakeholders. intelligence about evolving threats.
linkedin.com/in/harunseker
CTI Books
List of general Cyber Threat Intelligence (CTI) books highly recommended for 2025:
linkedin.com/in/harunseker
Highly recommended videos CTI Videos
1. SOCRadar YouTube channel is likely an extension of their efforts to educate and engage with their audience about
cybersecurity topics, while also promoting their Extended Threat Intelligence platform and
services.https://www.youtube.com/@SOCRadar
2. ▶ The Cycle of Cyber Threat Intelligence https://www.youtube.com/watch?v=J7e74QLVxCk
This video by SANS Institute provides a comprehensive overview of the CTI process and remains a valuable resource.
3. ▶ Job Role Spotlight: Cyber Threat Intelligence https://www.youtube.com/watch?v=fvYb5-NxoDc
Amy Bejtlich's insights into the CTI career path are still relevant and informative.
4. ▶How to become a Cyber Threat Intel analyst: https://www.youtube.com/watch?v=3KFHOamRl-s
Gary Ruddell provides practical advice on entering the CTI field, making it an excellent resource for beginners.
5. ▶Mastering Cyber Threat Intelligence: Top Techniques!: https://www.youtube.com/watch?v=4gCVolbDLVo
This video by Skillweed covers key strategies and best practices in CTI, suitable for both beginners and professionals.
6. ▶Crash Course on Cyber Threat Intelligence / CTI: https://www.youtube.com/watch?v=O47mVizGlcI
This comprehensive compilation from TryHackMe's SOC Level 1 pathway provides a thorough overview of CTI topics.
7. ▶ Threat Hunting Masterclass-Techniques, Tools, and Tips for Beginners:
https://www.youtube.com/watch?v=y-kFlJ9-eaw
While focused on threat hunting, this masterclass covers many aspects of CTI that are valuable for analysts.
linkedin.com/in/harunseker
Top 10 Free Cyber Threat Intelligence Courses
1. MITRE ATT&CK for Cyber Threat Intelligence Training: https://attack.mitre.org/resources/training/cti/
This comprehensive training by MITRE is highly regarded in the industry and covers essential aspects of using the ATT&CK framework for
CTI5.
2. Cyber Threat Intelligence (IBM) on Coursera: https://www.coursera.org/learn/ibm-cyber-threat-intelligence
Offered by IBM, this course provides a solid foundation in CTI concepts and practices.
3. TryHackMe Cyber Threat Intelligence Module: https://tryhackme.com/module/cyber-threat-intelligence
TryHackMe offers hands-on, practical learning experiences in CTI4.
4. Cybrary's Intro to Cyber Threat Intelligence: https://www.cybrary.it/course/intro-cyber-threat-intelligence
This course provides a good introduction to CTI concepts and practices.
5. SANS Cyber Threat Intelligence Course (Free Version): https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/
While SANS courses are typically paid, they occasionally offer free versions or trials of their CTI course.
6. Mandiant Cyber Threat Intelligence Training (Free Modules): https://www.mandiant.com/academy
Mandiant offers some free CTI training modules as part of their academy.
7. Recorded Future's Threat Intelligence Grading System (TIGS) Course: https://www.recordedfuture.com/training
Recorded Future provides free access to their TIGS course, which is valuable for CTI analysts.
8. MISP (Malware Information Sharing Platform) Training Materials: https://www.misp-project.org/documentation/
MISP offers free training materials for their open-source threat intelligence platform.
9. Open CTI Training Resources: https://www.opencti.io/en/resources
Open CTI provides free resources and documentation for learning about their open-source CTI platform.
10. OSINT Framework Resources: https://osintframework.com/
While not a course per se, this collection of OSINT tools and resources is invaluable for CTI analysts and offers opportunities for
self-directed learning.
linkedin.com/in/harunseker
Top 10 Threat Intelligence Certifications
1. CTIA: Certified Threat Intelligence Analyst by EC-Council https://www.eccouncil.org/train-certify/certified- threat-intelligence-analyst-ctia
2. GCTI: GIAC Cyber Threat Intelligence https://www.giac.org/certifications/cyber-threat-intelligence-gcti
3. RCIA – Rocheston Cyberthreat Intelligence Analyst: https://www.rocheston.com/certification/Cyberthreat-Intelligence-Analyst/
4. CCTIA by the NICCS – Certified Cyber Threat Intelligence Analyst :
https://niccs.us-cert.gov/training/search/cybertraining-365/certified-cyber-threat-intelligence-analyst
5. CTI (Center for TI) Certificates: https://www.centerforti.com/certifications
6. The Certified Threat Intelligence Analyst – Cyber Intelligence Tradecraft:
https://www.treadstone71.com/index.php/cyber-intelligence-training/cyber-intelligence-tradecraft-certification
7. The OSINT Pathfinder Programme: https://arnoreuser.com/
8. CPTIA – CREST Practitioner Threat Intelligence Analyst:
https://www.crest-approved.org/examination/crest-practitioner-threat-intelligence-analyst/index.html
9. CRTIA – CREST Registered Threat Intelligence Analyst:
https://crest-approved.org/examination/crest-registered-threat-intelligence-analyst/index.html
10. CCTIM – CREST Certified Threat Intelligence Manager:
https://crest-approved.org/examination/crest-certified-threat-intelligence-manager/index.html
linkedin.com/in/harunseker
Top 10 Threat Intelligence Conferences to Attend in 2025
1. SANS Cyber Threat Intelligence Summit & Training 2025 (January 27 to February 3):
https://www.sans.org/cyber-security-training-events/cyber-threat-intelligence-summit-2025/
2. 4th IEEE International Conference on AI in Cybersecurity (ICAIC) (February 5-7):
https://icaic-conferences.ca
3. Zero Trust World 2025 (February 19-21):
Registration link not provided in the search results.
4. Black Hat USA 2025 (August 3-8):
https://blackhat.informatech.com/usa/2025/ (inferred based on the Asia link)
Black Hat Asia 2025 (April 1-4):
https://blackhat.informatech.com/asia/2025/5
5. Innovate Cybersecurity Summit 2025 (April 6-8 & October 5-7):
https://abnormalsecurity.com/blog/announcing-innovate-2025
6. RSA Conference 2025 (April 28 to May 1):
Registration link not provided in the search results.
7. Gartner Security & Risk Management Summit 2025 (June 9-11):
https://www.gartner.com/en/conferences/hub/cybersecurity-conferences
8. FIRST Annual Conference (June 22-27):
https://www.first.org/conference/2025/registration-options
9. DEF CON 33 (August 7-10):
DEF CON typically does not offer pre-registration and requires cash payment at the door.
10. InfoSec World 2025 (October 25-30):
https://events.infosecworldusa.com/2025
linkedin.com/in/harunseker
Lists of awesome Threat Intelligence resource
● Awesome Intelligence: https://github.com/ARPSyndicate/awesome-intelligence
● Awesome-threat-intelligence: https://github.com/hslatman/awesome-threat-intelligence
● Awesome threat detection Resources: https://github.com/0x4D31/awesome-threat-detection
● Awesome open source intelligence tools and resources: https://github.com/jivoi/awesome-osint
● Get the latest technical details on significant advanced malware activity:
https://www.trellix.com/en-us/advanced-research-center.html
● 10 of the Best Open Source Threat Intelligence Feeds:
https://d3security.com/blog/10-of-the-best-open-source-threat-intelligence-feeds/
● Weekly Threat Briefing—Cyber Threat Intelligence Delivered to You: Anomali Weekly Threat Briefing
● Threat Intelligence Defined and Explored: https://www.forcepoint.com/cyber-edu/threat-intelligence
● Cyber Threat Intelligence Feeds: https://thecyberthreat.com/cyber-threat-intelligence-feeds/
● Deepdark CTI : https://github.com/fastfire/deepdarkCTI/tree/main
linkedin.com/in/harunseker
𝗕𝗲𝘀𝘁 𝗙𝗥𝗘𝗘 𝗗𝗮𝗿𝗸 𝗪𝗲𝗯 & 𝗖𝗧𝗜 𝗧𝗼𝗼𝗹𝘀 - 𝟮𝟬𝟮𝟱
Dark Web Monitoring, Cyber Threat Intelligence, Attack Surface Management, and Supply Chain Intelligence are crucial for modern
cybersecurity – kudos to SOCRadar® Extended Threat Intelligence for providing these essential tools for free.
⏩Dark Web Report : https://socradar.io/labs/dark-web-report/
● Checks if personal/organizational data appears on dark web markets, forums, or Telegram channels.
⏩External Attack Surface Discovery: https://socradar.io/labs/external-attack-surface/
● Identifies internet-facing assets vulnerable to cyberattacks using threat intelligence algorithms.
⏩BlueBleed Detection: https://socradar.io/labs/bluebleed/
● Flags data leaks from misconfigured cloud storage (AWS, Azure, Google) across 150K+ companies.
⏩Threat Actor Intelligence: https://socradar.io/labs/threat-actor/
● Profiles APT groups (e.g., APT 42) and ransomware operations with rankings and tactics.
⏩DarkMirror Monitoring: https://lnkd.in/ddYnU9Rp
● Tracks dark web news trends across 1018 industries and 28K+ threat actor discussions.
⏩Campaign Analysis: https://socradar.io/labs/campaigns/
● Details active cyber campaigns (e.g., Lazarus Group’s CookieMiner) with IOCs and reports.
⏩IOC Radar: https://socradar.io/labs/ioc-radar/
● Provides AI-enriched indicators of compromise (IPs, domains) linked to malware/attackers.
⏩CVE Radar: https://socradar.io/labs/cve-radar/
● Monitors vulnerability trends and risk scores using dark/web data and community insights.
SOCRadar Free Tools Link: https://socradar.io/labs/
linkedin.com/in/harunseker
Harun Seker
linkedin.com/in/harunseker
linkedin.com/in/harunseker