John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.
Which of the following types of threat intelligence did he use?
Owen
4 months agoSvetlana
4 months agoMindy
4 months agoDarrin
4 months agoRaymon
5 months agoTamekia
5 months agoInocencia
5 months agoLucina
5 months agoKristeen
5 months agoBethanie
5 months agoWillodean
5 months agoGlenn
5 months ago