Which of the following is used to gather cyber threat intelligence and generate threat analysis report?
Answers
Answered by
0
Answer:
ᴀs ᴡᴇ ᴍᴇɴᴛɪᴏɴᴇᴅ ᴇᴀʀʟɪᴇʀ ɪɴ ᴛʜɪs ᴄʜᴀᴘᴛᴇʀ, ᴛʜʀᴇᴀᴛ ʜᴜɴᴛɪɴɢ ᴘʟᴀᴛғᴏʀᴍs ᴀʀᴇ ᴜsᴇᴅ ᴛᴏ ɢᴀᴛʜᴇʀ ᴄʏʙᴇʀ ᴛʜʀᴇᴀᴛ ɪɴᴛᴇʟʟɪɢᴇɴᴄᴇ ᴀɴᴅ ɢᴇɴᴇʀᴀᴛᴇ ᴛʜʀᴇᴀᴛ ᴀɴᴀʟʏsɪs ʀᴇᴘᴏʀᴛs. ᴏɴᴇ ᴏғ ᴛʜᴇ ᴍᴏsᴛ ᴘᴏᴘᴜʟᴀʀ ᴘʟᴀᴛғᴏʀᴍs ᴜsᴇᴅ ɪs ᴄᴀʟʟᴇᴅ ᴍᴀʟᴛᴇɢᴏ. ... ᴍᴀʟᴛᴇɢᴏ ɪs ᴄᴏɴsɪᴅᴇʀᴇᴅ ᴀ ᴘᴏᴡᴇʀғᴜʟ ᴀɴᴅ ᴅʏɴᴀᴍɪᴄ ᴛʜʀᴇᴀᴛ ʜᴜɴᴛɪɴɢ ᴘʟᴀᴛғᴏʀᴍ ᴀʟʟᴏᴡɪɴɢ ᴍᴀɴʏ ᴄᴜsᴛᴏᴍɪᴢᴀʙʟᴇ ᴏᴘᴛɪᴏɴs.
Similar questions
Math,
2 months ago
Social Sciences,
2 months ago
English,
2 months ago
Social Sciences,
4 months ago
English,
4 months ago
Science,
9 months ago