Remove tag twitter
article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Additionally, dashboards share data about threat names, any relevant reference URLs, tags, adversary and malware families, and attack IDs. To submit malware URLs via the web, users must log in with Twitter, Google, LinkedIn, or GitHub, which will be publicly visible; the only way around this rule is to submit via API.

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

Last year, for example, I wrote my predictions based mainly on what I wished would happen, not what I thought realistically would. Last year I asked a senior executive at a major auto manufacturer the age old question: “What business are you in?” The world of the automobile moves slowly. Sound familiar, Facebook?

Marketing 111