Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?
Aracelis
4 months agoElise
4 months agoJules
4 months agoChau
4 months agoMike
4 months agoSheron
5 months agoBasilia
5 months agoSheldon
5 months agoQuiana
5 months agoCandra
5 months agoEmmanuel
5 months agoOra
5 months agoJeffrey
5 months ago