{"id":8232,"date":"2024-07-17T07:17:39","date_gmt":"2024-07-17T07:17:39","guid":{"rendered":"\/cybersecurity-blog\/?p=8232"},"modified":"2024-09-26T11:25:24","modified_gmt":"2024-09-26T11:25:24","slug":"types-of-threat-intelligence","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/","title":{"rendered":"What Are the 3 Types of Threat Intelligence Data"},"content":{"rendered":"\n<p>Cyber Threat Intelligence is a powerful tool that helps organizations make sense of the vast amounts of data generated by their cybersecurity systems.&nbsp;<\/p>\n\n\n\n<p>By analyzing this data, <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber threat intelligence<\/a> provides insights into the specific details of an organization&#8217;s security posture. It enables security teams to identify risks, anticipate potential threats, and assess the effectiveness of their remediation methods.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Three Levels of Cyber Threat Intelligence&nbsp;<\/h2>\n\n\n\n<p>To effectively combat cyber threats, it&#8217;s essential to understand the three levels of CTI: tactical, operational, and strategic.&nbsp;<\/p>\n\n\n\n<p>1. <strong>Tactical Intelligence (real-time)<\/strong>: focuses on specific threats as they occur. It operates in real-time, collecting data from ongoing security incidents. This intelligence directly informs the actions of an organization&#8217;s security tools, such as SIEM, TIP, firewalls, and EDR systems.&nbsp;<\/p>\n\n\n\n<p>2. <strong>Operational Intelligence (proactive)<\/strong>: takes a step back to assess potential threats and gauge the overall risk to an organization. It provides information about the origins of potential attacks and the likelihood of their occurrence. This intelligence helps shape remediation policies and guides the configuration of security tools.&nbsp;<\/p>\n\n\n\n<p><strong>3. Strategic Intelligence (far outlook)<\/strong>: offers a high-level overview of an organization&#8217;s threat landscape, considering geographic, political, and business trends. It presents broad patterns and identifies areas where new security tools or strategies may be required.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-1024x555.png\" alt=\"\" class=\"wp-image-8233\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-1024x555.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-300x163.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-768x416.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-1536x832.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-2048x1110.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image-3-740x401.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Search results for \u2018DestinationIp:&#8221;51.79.21.111&#8243;\u2019 query in ANY.RUN\u2019s TI Lookup&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>For example, <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=types_of_ti&amp;utm_term=170724&amp;utm_content=linktolookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s TI Lookup<\/a> is a CTI tool that helps security teams find many different types of ICOs associated with a single search parameter, in this case an IP. It\u2019s an example of tactical intelligence.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n\nSee how ANY.RUN\u2019s <span class=\"highlight\">TI Lookup<\/span> can benefit your team&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=types_of_ti&#038;utm_term=170724&#038;utm_content=linktotiplans\/\" rel=\"noopener\" target=\"_blank\">\nRequest a free trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Let\u2019s explore each of the 3 CTI levels in more detail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tactical intelligence&nbsp;<\/h2>\n\n\n\n<p>Tactical CTI identifies specific, real-time threats, enabling swift and appropriate responses. It is designed for security professionals responsible for daily threat identification and remediation to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proactively resolve ongoing cyber events&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inform users about <a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">TTPs<\/a> used by malicious actors&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Predict attack evolution and guide remediation efforts&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Tactical CTI focuses on specific, identified threats rather than abstract, potential risks.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Types of tactical TI data:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware signatures&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IP and URL blacklists&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Traffic patterns&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>File hashes&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>System events&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Operational intelligence&nbsp;<\/h2>\n\n\n\n<p>Operational CTI identifies potential threats and assesses their likelihood of affecting an organization. It is designed for security managers and network defense teams who need technical details about potential attacks while understanding broader trends.&nbsp;<\/p>\n\n\n\n<p>Operational CTI is used to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure policies and tailor security solutions to block likely attacks&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provide actionable insights that directly impact cybersecurity setup&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify threats before they become attacks&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Operational CTI is updated frequently (daily or every few days) to ensure the effectiveness of the cybersecurity infrastructure.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Types of Operational CTI Data:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Command and control channels&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware implementation details&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malicious file names and traffic&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Suspicious IP addresses and domains&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attack tools and URLs&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Strategic intelligence&nbsp;<\/h2>\n\n\n\n<p>Strategic CTI identifies the actors targeting an organization and their motivations. It is designed for high-level decision-makers, such as executive boards and C-level executives, responsible for the overall direction of the organization.&nbsp;<\/p>\n\n\n\n<p>Strategic intelligence helps to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan cybersecurity budgets and allocate resources effectively&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understand broad trends, risk areas, and the repercussions of cybersecurity threats&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decide whether to invest in further security based on emerging threats within the industry or region&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Types of strategic CTI data:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>New attack types and trends&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Economic and business impact of attacks and compromise&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regulatory and compliance legislation&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organizational and industry-wide vulnerabilities&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n\nIntegrate ANY.RUN\u2019s <span class=\"highlight\">threat intelligence feeds<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=types_of_ti&#038;utm_term=170724&#038;utm_content=linktofeeds\/\" rel=\"noopener\" target=\"_blank\">\nGet a free sample\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">A fourth level \u2014 technical intelligence&nbsp;<\/h2>\n\n\n\n<p>In addition to the three levels of TI we&#8217;ve covered above, there is a fourth level called <a href=\"https:\/\/any.run\/cybersecurity-blog\/technical-ti-use-case\/\" target=\"_blank\" rel=\"noreferrer noopener\">Technical Intelligence<\/a>. It specializes in the most low-level, machine-readable technical data, such as <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> delivered via threat intelligence feeds.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-1024x564.png\" alt=\"\" class=\"wp-image-8235\" width=\"650\" height=\"358\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-1024x564.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-768x423.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-1536x846.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-2048x1127.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-370x204.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/image2-2-740x407.png 740w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption class=\"wp-element-caption\"><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=types_of_ti&amp;utm_term=170724&amp;utm_content=linktolanding\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&#8216;s TI feeds provide IOCs collected from millions of sandbox analysis sessions<\/figcaption><\/figure>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/what-are-threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI feeds<\/a> are essentially streaming services for indicators that can be fed directly into an organization&#8217;s security tools to automatically detect and respond to threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=types_of_ti&amp;utm_term=170724&amp;utm_content=linktolanding\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>With TI Lookup you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Search across a large database the latest malware and phishing threat data<\/li>\n\n\n\n<li>Refine your search using over 40 parameters and their combinations<\/li>\n\n\n\n<li>Get results in seconds, each with a corresponding sandbox session<\/li>\n\n\n\n<li>Leverage YARA Search with a built-in rule editor<\/li>\n\n\n\n<li>Integrate with your security infrastructure using API<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=types_of_ti&amp;utm_term=170724&amp;utm_content=linktotiplans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Get a trial of TI Lookup \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Threat Intelligence is a powerful tool that helps organizations make sense of the vast amounts of data generated by their cybersecurity systems.&nbsp; By analyzing this data, cyber threat intelligence provides insights into the specific details of an organization&#8217;s security posture. It enables security teams to identify risks, anticipate potential threats, and assess the effectiveness [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,34,40],"class_list":["post-8232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Are the 3 Types of Threat Intelligence Data - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Learn about the three types of threat intelligence: tactical, operational, and strategic. See how they compare to technical intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"What Are the 3 Types of Threat Intelligence Data\",\"datePublished\":\"2024-07-17T07:17:39+00:00\",\"dateModified\":\"2024-09-26T11:25:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\"},\"wordCount\":836,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\",\"name\":\"What Are the 3 Types of Threat Intelligence Data - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-07-17T07:17:39+00:00\",\"dateModified\":\"2024-09-26T11:25:24+00:00\",\"description\":\"Learn about the three types of threat intelligence: tactical, operational, and strategic. See how they compare to technical intelligence.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Are the 3 Types of Threat Intelligence Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are the 3 Types of Threat Intelligence Data - ANY.RUN&#039;s Cybersecurity Blog","description":"Learn about the three types of threat intelligence: tactical, operational, and strategic. See how they compare to technical intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"What Are the 3 Types of Threat Intelligence Data","datePublished":"2024-07-17T07:17:39+00:00","dateModified":"2024-09-26T11:25:24+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/"},"wordCount":836,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/","url":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/","name":"What Are the 3 Types of Threat Intelligence Data - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-07-17T07:17:39+00:00","dateModified":"2024-09-26T11:25:24+00:00","description":"Learn about the three types of threat intelligence: tactical, operational, and strategic. See how they compare to technical intelligence.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/types-of-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"What Are the 3 Types of Threat Intelligence Data"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8232"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=8232"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8232\/revisions"}],"predecessor-version":[{"id":9001,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8232\/revisions\/9001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8236"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=8232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=8232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=8232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}