Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Threat Intelligence

Evidence-based knowledge about existing or emerging cyber threats, used to inform and improve security decisions.

Definition

Threat intelligence (TI) is the collection, analysis, and contextualization of information about threats targeting an organization or sector. It encompasses data about threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise, and the infrastructure they operate. Intelligence is produced at strategic, operational, and tactical levels to serve different audiences — from executive risk decisions to analyst-level detections.

Why It Matters

Raw security data is not intelligence. Threat intelligence adds context — who is attacking, how, why, and what assets are at risk — enabling proactive defense rather than reactive response. Organizations that consume and produce threat intelligence can prioritize vulnerabilities relevant to their sector, anticipate attacker behavior based on known TTPs, and share findings with the broader community to improve collective defense.

How It Works

The intelligence cycle involves direction (defining requirements), collection (gathering data from open sources, commercial feeds, dark web monitoring, honeypots, and ISACs), processing (normalizing and deduplicating), analysis (adding context and attribution), dissemination (sharing in structured formats such as STIX/TAXII or MISP), and feedback. Intelligence is classified by type: strategic (trends, nation-state activity), operational (specific campaigns), and tactical (IOCs, signatures).

DFIR Platform

IOC Enrichment API

DFIR Lab publishes weekly threat intelligence briefings at https://dfir-lab.ch/intel-briefings and maintains daily-refreshed threat actor profiles covering TTPs, targeted sectors, and associated infrastructure. The platform's IOC Enrichment API aggregates 14+ threat intelligence sources, delivering operational and tactical intelligence on IPs, domains, hashes, and URLs directly via API

View Documentation

Related Concepts

Indicators of CompromiseIOC EnrichmentThreat Actor ProfilingMITRE ATT&CK Framework

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free