IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

Securing the Weakest Link: Threat Modeling and the Software Supply Chain

DATE : 2025-02-16T05:30:30
SOURCE : medium.com

FILE_HASH_MD5:
9b8e69a3c846cd7ecc80f69437400657

Domain:
malicious.com
solarwinds.com

Url:
http://malicious.com/path