Threat Library

Threat Library is now a legacy experience

The Threat library module's functionality is being replaced by the Campaigns and Threat Actors modules in the new Intelligence Hub platform. Threat Library will remain available to existing customers for the time being.

The Intelligence Hub > Threat Library is a researched, organized, searchable library about known threat actors, malware, and campaigns (cyberterms).

From the Threat Library page, you can find details on cyberterms and related information and see information in the IOCs (indicators of compromise), Investigation, and IntelliFind pages.

Incident response teams and researchers can use the Threat Library to research and investigate, spot trends, and gain contextual intelligence regarding threats targeting geographic regions, including threat actor engagement and reconnaissance.

You can upload documents to existing cyberterms for your own, internal needs. This can turn the Threat Library into your internal knowledgebase of threat information.

Cyberterm tiles are sorted by most recent update date. The page above is also filtered by target sector.

You can search by company, industry, the trending threat actors, malware, and campaigns, and by names of attached files.

You can also filter by the following:

To find threats that match thisUse this filter
Targeted sectorsTarget Sector
Select sectors (or General ).
Targeted countryTarget Country
Select countries (or Global)
A specific type of threatType
Select Malware, Threat Actor, or Campaign.
Within a date rangeReport Date
Select the date range.
Geographic origin of the threatOrigin
Select countries.
A specific TTPTTP
Select TTPs.
Threats that you have marked for monitoringMonitored
Select Show only monitored cyber terms.
Cyberterms related to specific MITRE techniquesMITRE Technique
Select techniques.
AttachmentsWith Attachments
Select to find only cyberterms to which attachments have been uploaded.

When you filter, you'll see how many cyberterms match your filter. For your convenience, filters are persistent over sessions; the display will be filtered the same way until you change the filters.

Each cyberterm tile shows several overview details. To see the full details, click the cyberterm tile.

Additional details you can view are explained in the following table:

FieldDescription
TypeThe type of cyberterm, which will be a campaign, a threat actor, or malware.
OriginGeolocation from where they operate.
IntelliFind trendThe IntelliFind trend graph of mentions of this cyberterm.
MonitoringTurn monitoring on or off.
When a cyberterm is being monitored, an email will be sent any time the term is updated.
SeverityThe IntSights severity.
AttachmentIf an internal document is attached to the term it will show here.

Monitored threats

Based on user settings in My Profile > Notifications, you can receive email notifications for new threats of specific severities.
When you monitor a specific cyberterm, you will also be notified for all changes about that cyberterm.

To turn monitoring on (or off):

  1. From the Threat Command main menu, choose Intelligence Hub > Threat Library.
  2. Search for the cyberterm that you want to monitor.
    The cyberterm is displayed.
  3. Click the envelope icon to turn monitoring on (or off).

Upload documents to cyberterms

You can upload documents to existing cyberterms, and then preserve and manage that information within your own Threat Library knowledgebase.