From ab3bd6d867067f5b3ae2e537357f1986aab1fc87 Mon Sep 17 00:00:00 2001 From: Marc Ruef Date: Sat, 23 Apr 2022 10:18:00 +0200 Subject: [PATCH 1/3] Update README.md --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index c402e75d..3fb03711 100644 --- a/README.md +++ b/README.md @@ -17,3 +17,5 @@ We provide a wide variety of indicators like campaigns, country associations, IO ## Predictive Capabilities Due to our unique AI-based system we are able to provide predictive indicators. These are indicators which are not yet used in attacks but might be used by the specific actors. This helps to anticipate and mitigate attacks very eary. + +![The unique VulDB CTI model to predict activities and indicators](https://vuldb.com/documentation/images/cti_model.png) From d66dcfbdb411dba1a2e9c2056a912b5dbf445f93 Mon Sep 17 00:00:00 2001 From: Marc Ruef Date: Sat, 23 Apr 2022 10:18:28 +0200 Subject: [PATCH 2/3] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 3fb03711..d9fbdc46 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # Cyber Threat Intelligence Data and Analysis -Our unique [Cyber Threat Intelligence](https://vuldb.com/?doc.cti) aims to determine the ongoing research of APT actors to anticipiate their acitivities. +Our unique [Cyber Threat Intelligence](https://vuldb.com/?kb.cti) aims to determine the ongoing research of APT actors to anticipiate their acitivities. ## Activity Monitoring From 0bedd27918889890089d74a8df41b8a42a14e5ca Mon Sep 17 00:00:00 2001 From: Marc Ruef Date: Sat, 23 Apr 2022 10:19:19 +0200 Subject: [PATCH 3/3] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d9fbdc46..b30dc36c 100644 --- a/README.md +++ b/README.md @@ -4,11 +4,11 @@ Our unique [Cyber Threat Intelligence](https://vuldb.com/?kb.cti) aims to determ ## Activity Monitoring -A broad activity monitoring is used to determine the actions by actors. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and social media exchanges makes it possible to identify planned attacks. +A broad activity monitoring is used to determine the actions by [actors](https://vuldb.com/?actor). Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and social media exchanges makes it possible to identify planned attacks. ## Geopolitical Analysis -The CTI team is mapping structures of countries and their relationships to identify tensions and possible attack scenarios. +The CTI team is mapping structures of [countries](https://vuldb.com/?country) and their relationships to identify tensions and possible attack scenarios. ## Indicators