Learn the basics of threat intelligence — collection, analysis, and dissemination. Covers threat actors, TTPs, IOCs, and the intelligence cycle used by security teams worldwide.
45 minBeginner
CVE & Vulnerability Management
Understand the CVE lifecycle from disclosure to patch. Learn CVSS scoring, prioritisation frameworks, and how to use CISA's KEV catalog to focus remediation efforts.
60 minIntermediate
OT/ICS Security Best Practices
Essential security practices for protecting Operational Technology and industrial control systems. Covers network segmentation, SCADA hardening, and ICS-specific threat actors.
50 minIntermediate
MITRE ATT&CK Framework
Master the industry-standard framework for understanding adversary tactics and techniques. Learn how to map threats to ATT&CK and use it for detection and red team exercises.
55 minIntermediate
Incident Response Planning
Develop and implement an effective incident response plan. Covers NIST IR lifecycle, playbook creation, ransomware response, and post-incident reporting best practices.
70 minAdvanced
OWASP Top 10 Web Vulnerabilities
Understand the most critical web application security risks. Covers injection attacks, broken authentication, XSS, IDOR, and security misconfigurations with real-world examples.
40 minBeginner
NIST Cybersecurity Framework
Apply the NIST CSF 2.0 to build a resilient security program. Covers the five core functions — Identify, Protect, Detect, Respond, Recover — with practical implementation guidance.
65 minIntermediate
Ransomware Defence & Recovery
Understand how modern ransomware operates and how to defend against it. Covers backup strategies, network isolation, negotiation considerations, and recovery playbooks.
50 minAdvanced
API Security
Protect APIs from the OWASP API Top 10 vulnerabilities. Covers authentication, rate limiting, input validation, and monitoring strategies for modern REST and GraphQL APIs.
40 minIntermediate
Tutorials link to trusted resources from CISA, NIST, MITRE, and OWASP. More tutorials coming soon.
Social Media Threat Intelligence
Loading social media intelligence...
About ThreatAft
ThreatAft is a comprehensive Cyber Threat Intelligence platform designed to provide real-time security insights and threat analysis for both IT and OT (Operational Technology) environments.
Our mission is to empower security professionals, IT teams, and industrial security operators with actionable intelligence to protect critical infrastructure and business operations from evolving cyber threats.
IT Security Intelligence
We monitor and analyze threats targeting traditional IT infrastructure including:
Vulnerabilities
Zero-day exploits, CVEs, and security patches for enterprise systems and applications.
Malware Analysis
Ransomware, trojans, and advanced persistent threats targeting corporate networks.
Phishing Campaigns
Social engineering attacks, credential harvesting, and business email compromise.
OT Security Intelligence
Specialized threat intelligence for industrial control systems and critical infrastructure:
Industrial Systems
Threats targeting SCADA, PLCs, HMIs, and industrial networking equipment.
Critical Infrastructure
Attacks on energy grids, water treatment, manufacturing, and transportation systems.
Safety Systems
Protection for safety instrumented systems and industrial safety protocols.
Our Intelligence Sources
ThreatAft aggregates and analyzes data from multiple trusted sources including:
Government advisories (CISA, NCSC, ENISA, US-CERT)
Security research blogs and threat intelligence feeds
Social media threat intelligence (X, LinkedIn, Reddit)
Vulnerability databases and security advisories
Trust & Reliability
We prioritize information from trusted sources including government agencies, established security vendors, and reputable security researchers. All news is categorized by trust level to help you identify the most reliable information.
Social Media Threat Intelligence
Loading social media intelligence...