CINXE.COM
Assets - Cyber Threat Alliance
<!doctype html> <html lang="en-US"> <head> <!-- Google Tag Manager --> <script nonce='9c2ee6cfeb'>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-T23SB83');</script> <!-- End Google Tag Manager --> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="apple-touch-icon" sizes="180x180" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/favicon-16x16.png"> <link rel="manifest" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/site.webmanifest"> <link rel="mask-icon" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/safari-pinned-tab.svg" color="#5bbad5"> <meta name="msapplication-TileColor" content="#da532c"> <meta name="theme-color" content="#ffffff"> <script nonce='9c2ee6cfeb' type="text/javascript"> window.ajaxurl = 'https://www.cyberthreatalliance.org/wp-admin/admin-ajax.php'; window.homeurl = 'https://www.cyberthreatalliance.org/'; window.searchurl = 'https://www.cyberthreatalliance.org/?s='; </script> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO plugin v23.7 - https://yoast.com/wordpress/plugins/seo/ --> <title>Assets - Cyber Threat Alliance</title> <meta name="description" content="The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers." /> <link rel="canonical" href="https://www.cyberthreatalliance.org/resources/assets/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Assets - Cyber Threat Alliance" /> <meta property="og:description" content="The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers." /> <meta property="og:url" content="https://www.cyberthreatalliance.org/resources/assets/" /> <meta property="og:site_name" content="Cyber Threat Alliance" /> <meta property="article:modified_time" content="2023-01-25T22:03:09+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.cyberthreatalliance.org/resources/assets/","url":"https://www.cyberthreatalliance.org/resources/assets/","name":"Assets - Cyber Threat Alliance","isPartOf":{"@id":"https://www.cyberthreatalliance.org/#website"},"datePublished":"2023-01-23T16:37:50+00:00","dateModified":"2023-01-25T22:03:09+00:00","description":"The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers.","breadcrumb":{"@id":"https://www.cyberthreatalliance.org/resources/assets/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.cyberthreatalliance.org/resources/assets/"]}]},{"@type":"BreadcrumbList","@id":"https://www.cyberthreatalliance.org/resources/assets/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.cyberthreatalliance.org/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https://www.cyberthreatalliance.org/resources/"},{"@type":"ListItem","position":3,"name":"Assets"}]},{"@type":"WebSite","@id":"https://www.cyberthreatalliance.org/#website","url":"https://www.cyberthreatalliance.org/","name":"Cyber Threat Alliance","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.cyberthreatalliance.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}</script> <!-- / Yoast SEO plugin. --> <link rel='stylesheet' id='wp-block-library-css' href='https://www.cyberthreatalliance.org/wp-includes/css/dist/block-library/style.min.css' media='all' /> <style id='wp-block-library-theme-inline-css'> .wp-block-audio :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-audio :where(figcaption){color:#ffffffa6}.wp-block-audio{margin:0 0 1em}.wp-block-code{border:1px solid #ccc;border-radius:4px;font-family:Menlo,Consolas,monaco,monospace;padding:.8em 1em}.wp-block-embed :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-embed :where(figcaption){color:#ffffffa6}.wp-block-embed{margin:0 0 1em}.blocks-gallery-caption{color:#555;font-size:13px;text-align:center}.is-dark-theme .blocks-gallery-caption{color:#ffffffa6}:root :where(.wp-block-image figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme :root :where(.wp-block-image figcaption){color:#ffffffa6}.wp-block-image{margin:0 0 1em}.wp-block-pullquote{border-bottom:4px solid;border-top:4px solid;color:currentColor;margin-bottom:1.75em}.wp-block-pullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase}.wp-block-quote{border-left:.25em solid;margin:0 0 1.75em;padding-left:1em}.wp-block-quote cite,.wp-block-quote footer{color:currentColor;font-size:.8125em;font-style:normal;position:relative}.wp-block-quote:where(.has-text-align-right){border-left:none;border-right:.25em solid;padding-left:0;padding-right:1em}.wp-block-quote:where(.has-text-align-center){border:none;padding-left:0}.wp-block-quote.is-large,.wp-block-quote.is-style-large,.wp-block-quote:where(.is-style-plain){border:none}.wp-block-search .wp-block-search__label{font-weight:700}.wp-block-search__button{border:1px solid #ccc;padding:.375em .625em}:where(.wp-block-group.has-background){padding:1.25em 2.375em}.wp-block-separator.has-css-opacity{opacity:.4}.wp-block-separator{border:none;border-bottom:2px solid;margin-left:auto;margin-right:auto}.wp-block-separator.has-alpha-channel-opacity{opacity:1}.wp-block-separator:not(.is-style-wide):not(.is-style-dots){width:100px}.wp-block-separator.has-background:not(.is-style-dots){border-bottom:none;height:1px}.wp-block-separator.has-background:not(.is-style-wide):not(.is-style-dots){height:2px}.wp-block-table{margin:0 0 1em}.wp-block-table td,.wp-block-table th{word-break:normal}.wp-block-table :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-table :where(figcaption){color:#ffffffa6}.wp-block-video :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-video :where(figcaption){color:#ffffffa6}.wp-block-video{margin:0 0 1em}:root :where(.wp-block-template-part.has-background){margin-bottom:0;margin-top:0;padding:1.25em 2.375em} </style> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--base: #ffffff;--wp--preset--color--contrast: #000000;--wp--preset--color--primary: #f26722;--wp--preset--color--secondary: #191e4b;--wp--preset--color--tertiary: #6e6f72;--wp--preset--color--quaternary: #3CAB6C;--wp--preset--color--light-gray: #ccc;--wp--preset--color--lighter-gray: #eee;--wp--preset--color--dark-gray: #333;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.469), 20px);--wp--preset--font-size--large: clamp(22.041px, 1.378rem + ((1vw - 3.2px) * 1.091), 36px);--wp--preset--font-size--x-large: clamp(25.014px, 1.563rem + ((1vw - 3.2px) * 1.327), 42px);--wp--preset--font-family--roboto: "Roboto", sans-serif;--wp--preset--font-family--roboto-condensed: "Roboto Condensed", sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);--wp--custom--spacing--padded: clamp(1.5rem, 2.5vw, 2rem);}:root { --wp--style--global--content-size: var(--breakpoint-large);--wp--style--global--wide-size: var(--breakpoint-xlarge); }:where(body) { margin: 0; }.wp-site-blocks { padding-top: var(--wp--style--root--padding-top); padding-bottom: var(--wp--style--root--padding-bottom); }.has-global-padding { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding > .alignfull { margin-right: calc(var(--wp--style--root--padding-right) * -1); margin-left: calc(var(--wp--style--root--padding-left) * -1); }.has-global-padding :where(:not(.alignfull.is-layout-flow) > .has-global-padding:not(.wp-block-block, .alignfull)) { padding-right: 0; padding-left: 0; }.has-global-padding :where(:not(.alignfull.is-layout-flow) > .has-global-padding:not(.wp-block-block, .alignfull)) > .alignfull { margin-left: 0; margin-right: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}.is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}body{font-family: var(--wp--preset--font-family--roboto);line-height: 1.6;--wp--style--root--padding-top: var(--wp--preset--spacing--40);--wp--style--root--padding-right: var(--wp--preset--spacing--60);--wp--style--root--padding-bottom: var(--wp--preset--spacing--40);--wp--style--root--padding-left: var(--wp--preset--spacing--60);}a:where(:not(.wp-element-button)){text-decoration: underline;}h3{font-family: var(--wp--preset--font-family--roboto-condensed);font-weight: 300;}:root :where(.wp-element-button, .wp-block-button__link){background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;font-weight: 700;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;text-transform: uppercase;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-base-color{color: var(--wp--preset--color--base) !important;}.has-contrast-color{color: var(--wp--preset--color--contrast) !important;}.has-primary-color{color: var(--wp--preset--color--primary) !important;}.has-secondary-color{color: var(--wp--preset--color--secondary) !important;}.has-tertiary-color{color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-color{color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-color{color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-color{color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-color{color: var(--wp--preset--color--dark-gray) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-base-background-color{background-color: var(--wp--preset--color--base) !important;}.has-contrast-background-color{background-color: var(--wp--preset--color--contrast) !important;}.has-primary-background-color{background-color: var(--wp--preset--color--primary) !important;}.has-secondary-background-color{background-color: var(--wp--preset--color--secondary) !important;}.has-tertiary-background-color{background-color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-background-color{background-color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-background-color{background-color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-background-color{background-color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-background-color{background-color: var(--wp--preset--color--dark-gray) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-base-border-color{border-color: var(--wp--preset--color--base) !important;}.has-contrast-border-color{border-color: var(--wp--preset--color--contrast) !important;}.has-primary-border-color{border-color: var(--wp--preset--color--primary) !important;}.has-secondary-border-color{border-color: var(--wp--preset--color--secondary) !important;}.has-tertiary-border-color{border-color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-border-color{border-color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-border-color{border-color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-border-color{border-color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-border-color{border-color: var(--wp--preset--color--dark-gray) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-roboto-font-family{font-family: var(--wp--preset--font-family--roboto) !important;}.has-roboto-condensed-font-family{font-family: var(--wp--preset--font-family--roboto-condensed) !important;} :root :where(.wp-block-button .wp-block-button__link){border-radius: 1em;border-color: transparent;border-width: 0;border-style: solid;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: clamp(0.984em, 0.984rem + ((1vw - 0.2em) * 0.645), 1.5em);line-height: 1.6;} :root :where(.wp-block-heading){font-family: var(--wp--preset--font-family--roboto-condensed);font-weight: 300;} :root :where(.wp-block-cover){padding-top: var(--spacing);padding-right: var(--spacing);padding-bottom: var(--spacing);padding-left: var(--spacing);} :root :where(.wp-block-cover h2){font-family: var(--wp--preset--font-family--roboto-condensed);font-size: var(--step-4);font-style: normal;font-weight: 700;line-height: 1.2;margin-top: 0;margin-bottom: 0;} :root :where(.wp-block-cover h3){font-family: var(--wp--preset--font-family--roboto-condensed);font-size: clamp(1.25rem, 1.25rem + ((1vw - 0.2rem) * 0.938), 2rem);font-weight: 700;margin-top: 0;margin-bottom: 0;text-transform: uppercase;} :root :where(.wp-block-buttons){margin-top: var(--spacing);margin-bottom: var(--spacing);} </style> <link rel='stylesheet' id='app/0-css' href='https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/css/app.d8de28.css' media='all' /> <link rel="https://api.w.org/" href="https://www.cyberthreatalliance.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.cyberthreatalliance.org/wp-json/wp/v2/pages/8047" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.cyberthreatalliance.org/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel='shortlink' href='https://www.cyberthreatalliance.org/?p=8047' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.cyberthreatalliance.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cyberthreatalliance.org%2Fresources%2Fassets%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.cyberthreatalliance.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cyberthreatalliance.org%2Fresources%2Fassets%2F&format=xml" /> <style class='wp-fonts-local'> @font-face{font-family:Roboto;font-style:normal;font-weight:400;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-regular.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:italic;font-weight:400;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-italic.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:normal;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-700.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:italic;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-700italic.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:"Roboto Condensed";font-style:normal;font-weight:300;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto-condensed/roboto-condensed-300.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:"Roboto Condensed";font-style:normal;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto-condensed/roboto-condensed-700.woff2') format('woff2');font-stretch:normal;} </style> </head> <body class="page-template page-template-template-assets page-template-template-assets-php page page-id-8047 page-child parent-pageid-8026 wp-embed-responsive assets"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-T23SB83" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="app"> <a class="skip-to-content" href="#content">Skip to content</a> <div class="site-wrapper"> <header class="header wrapper " role="banner" itemscope itemtype="http://schema.org/WPHeader"> <div class="header__logo-navigation wrapper__inner wrapper__inner--xxlarge"> <div class="logo" itemscope itemtype="http://schema.org/Organization"> <a href="https://www.cyberthreatalliance.org"> <svg xmlns="http://www.w3.org/2000/svg" width="305" height="45" viewBox="0 0 305.5 45.4"><defs><style>.b-ct,.c-ct{fill:#f26722;}.d-ct{fill:#fff;}.e-ct{fill:#6e6f72;}.e-ct,.c-ct{fill-rule:evenodd;}</style></defs><path class="b-ct" d="m69,24.3c0,1.7-.4,2.9-1.5,3.9-1.17.98-2.67,1.49-4.2,1.4-1.8,0-3.3-.6-4.4-1.7s-1.6-2.7-1.6-4.5v-3c0-1.8.5-3.3,1.6-4.5,1.11-1.18,2.68-1.81,4.3-1.7,1.8,0,3.3.5,4.3,1.4,1,.9,1.5,2.2,1.5,3.9v.1h-2.9c0-1-.2-1.7-.7-2.3-.5-.5-1.2-.7-2.2-.7-.9,0-1.6.3-2.2,1.1s-.8,1.6-.8,2.7v3c0,1.1.3,2.1.8,2.8s1.3,1.1,2.2,1.1,1.6-.3,2.1-.8c.4-.5.7-1.2.7-2.2,0,0,3,0,3,0Zm7.3-2.9l3.3-6.9h3.3l-5.1,9.7v5.2h-3v-5.4l-5-9.5h3.3l3.2,6.9Zm8.1,8v-14.9h5c1.8,0,3.1.3,4.1,1s1.5,1.7,1.5,3.1c0,.7-.2,1.3-.5,1.9-.4.5-.9,1-1.6,1.2.9.2,1.6.6,2,1.2s.7,1.4.7,2.2c0,1.4-.5,2.5-1.4,3.2s-2.3,1.1-4,1.1c0,0-5.8,0-5.8,0Zm3-8.7h2.2c.8,0,1.4-.2,1.8-.5s.6-.8.6-1.4c0-.7-.2-1.2-.7-1.5-.4-.3-1.1-.5-1.9-.5h-2.1v3.9h.1Zm0,2.1v4.3h2.8c.64.03,1.27-.15,1.8-.5.4-.3.6-.9.6-1.5,0-.7-.2-1.3-.5-1.7s-.9-.6-1.7-.6c0,0-3,0-3,0Zm19.6,0h-6.2v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2Zm5.9.6v6h-3v-14.9h5.6c1.7,0,3,.4,4,1.2s1.4,1.9,1.4,3.2c0,.8-.2,1.4-.6,2s-1,1-1.8,1.3c.9.3,1.5.7,1.9,1.3.4.6.6,1.4.6,2.3v1.1l.2,1.3c.1.5.3.8.6,1v.2h-3.1c-.3-.2-.5-.6-.5-1.1l-.1-1.5v-1.1c0-.7-.2-1.3-.6-1.7-.4-.4-1-.6-1.7-.6,0,0-2.9,0-2.9,0Zm0-2.3h2.6c.8,0,1.5-.2,1.9-.5.4-.4.6-.9.6-1.6s-.2-1.2-.6-1.6c-.4-.4-1-.6-1.8-.6h-2.6v4.3h-.1Zm26.4-4.3h-4.2v12.6h-3v-12.6h-4.2v-2.3h11.4v2.3Zm13.8,12.6h-3v-6.2h-6.1v6.2h-3v-14.9h3v6.4h6.1v-6.4h3v14.9Zm5.8-6v6h-3v-14.9h5.6c1.7,0,3,.4,4,1.2s1.4,1.9,1.4,3.2c0,.8-.2,1.4-.6,2s-1,1-1.8,1.3c.9.3,1.5.7,1.9,1.3s.6,1.4.6,2.3v1.1l.2,1.3c.1.5.3.8.6,1v.2h-3.1c-.3-.2-.5-.6-.5-1.1l-.1-1.5v-1.1c0-.7-.2-1.3-.6-1.7s-1-.6-1.7-.6c0,0-2.9,0-2.9,0Zm0-2.3h2.6c.8,0,1.5-.2,1.9-.5.4-.4.6-.9.6-1.6s-.2-1.2-.6-1.6-1-.6-1.8-.6h-2.6v4.3h-.1Zm20,1.7h-6.2v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2Zm10.9,3.4h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2h0Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm20.3-7h-4.3v12.6h-3v-12.6h-4.2v-2.3h11.4v2.3h.1Z"/><path class="d-ct" d="m219.2,26.2h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm12.9,3.3h6.6v2.3h-9.6v-14.9h3v12.6Zm11.4,0h6.6v2.3h-9.6v-14.9h3v12.6Zm11.5,2.3h-3v-14.9h3v14.9Zm11-3.2h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2h0Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm22,5.6h-3l-6-10.2h-.1v10.2h-3v-14.9h3l6,10.2h.1v-10.2h3v14.9Zm14.1-5.1c0,1.7-.4,2.9-1.5,3.9-1.17.98-2.67,1.49-4.2,1.4-1.8,0-3.3-.6-4.4-1.7s-1.7-2.6-1.7-4.5v-3c0-1.8.5-3.3,1.6-4.5,1.11-1.18,2.68-1.81,4.3-1.7,1.8,0,3.3.5,4.3,1.4,1,.9,1.5,2.2,1.5,3.9v.1h-2.9c0-1-.2-1.7-.7-2.3-.59-.55-1.39-.84-2.2-.8-.9,0-1.6.4-2.1,1.1s-.8,1.7-.8,2.8v3c0,1.1.3,2.1.8,2.8s1.3,1.1,2.2,1.1,1.6-.3,2.1-.8c.4-.5.7-1.2.7-2.2h3,0Zm11.3-1.5h-6.1v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2h-.1Z"/><path class="e-ct" d="m17,39.5l6.6,5.9,21.7-23-15.7-15.4-5.5,5.9,8.9,9.5-16,17.1Z"/><path class="c-ct" d="m28.3,5.9L21.8,0,0,23l15.8,15.4,5.4-5.9-8.9-9.5L28.3,5.9Z"/></svg> <span class="screen-reader-text">Cyber Threat Alliance</span> </a> </div> <div class="navigation navigation-main"> <div class="navigation__button__wrap"> <button class="navigation__toggle" data-menu=".navigation__list"> <span class="screen-reader-text">Menu</span> <svg aria-hidden="true" viewBox="0 0 128 128" width="30" height="30"><path class="icon-nav-bar icon-nav-top" d="M0 0h128v27H0z"/><path class="icon-nav-bar icon-nav-middle" d="M0 50.5h128v27H0z"/><path class="icon-nav-bar icon-nav-bottom" d="M0 101h128v27H0z"/></svg> </button> </div> <nav id="navigation-main" class="navigation__list" aria-label="Main" itemscope itemtype="http://schema.org/SiteNavigationElement"> <ul > <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7941 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/about/">About CTA</a> <button class="showsubmenu"><span class="screen-reader-text">Show Submenu</span>+</button> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7942"> <a href="https://www.cyberthreatalliance.org/about/who-we-are/">Who We Are</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8091"> <a href="https://www.cyberthreatalliance.org/about/board-of-directors/">Board of Directors</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8099"> <a href="https://www.cyberthreatalliance.org/about/our-sharing-model/">Our Sharing Model</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8199"> <a href="https://www.cyberthreatalliance.org/about/testimonials/">Testimonials</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8236"> <a href="https://www.cyberthreatalliance.org/membership/">Membership</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8042"> <a href="https://www.cyberthreatalliance.org/partnerships/">Partnerships</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8128"> <a href="https://www.cyberthreatalliance.org/news/">News</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8127"> <a href="https://www.cyberthreatalliance.org/events/">Events</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-page-ancestor current-menu-ancestor current-menu-parent current-page-parent current_page_parent current_page_ancestor menu-item-8033 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/resources/">Resources</a> <button class="showsubmenu"><span class="screen-reader-text">Show Submenu</span>+</button> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-8047 current_page_item menu-item-8144"> <a href="https://www.cyberthreatalliance.org/resources/assets/">Assets</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8393"> <a href="https://www.cyberthreatalliance.org/resources/webinars/">Webinars</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8213"> <a href="https://www.cyberthreatalliance.org/resources/recommended-resources/">Recommended Resources</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8143"> <a href="https://www.cyberthreatalliance.org/member-shares/">Member Shares</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7993"> <a href="https://www.cyberthreatalliance.org/blog/">Blog</a> </li> </ul> </nav> <div class="navigation__search"> <div class="menu-search-button"> <a id="menu-search-button" href="#"> <span class="screen-reader-text">Search</span> <svg aria-hidden="true" xmlns="http://www.w3.org/2000/svg" width="13" height="13" viewBox="0 0 13 13"><path d="M4.5,9A4.5,4.5,0,1,1,9,4.5,4.505,4.505,0,0,1,4.5,9Zm0-7A2.5,2.5,0,1,0,7,4.5,2.503,2.503,0,0,0,4.5,2Z" fill="#fff"/><path d="M12,13a.9967.9967,0,0,1-.707-.293l-3.5-3.5A1,1,0,1,1,9.207,7.793l3.5,3.5A1,1,0,0,1,12,13Z" fill="#fff"/></svg> </a> </div> <div class="menu-search" id="menu-search"> <form action="https://www.cyberthreatalliance.org" method="get"> <label for="menu-search-field" class="screen-reader-text">Search</label> <input type="text" name="s" id="menu-search-field"> </form> </div> </div> </div> </div> </header> <div class="wrapper page-header__wrapper is-layout-constrained wp-block-group alignfull is-style-padded"> <div class="page-header wrapper__inner is-layout-flow wp-block-group alignwide"> <h1 class="page-header-title"> Assets </h1> <div class="breadcrumbs"> <span><span><a href="https://www.cyberthreatalliance.org/">Home</a></span> 禄 <span><a href="https://www.cyberthreatalliance.org/resources/">Resources</a></span> 禄 <span class="breadcrumb_last" aria-current="page">Assets</span></span> </div> </div> </div> <section id="content" role="main" class="wrapper content__wrapper"> <div class="wrapper__inner wrapper__inner--nopadding is-layout-constrained has-global-padding"> <div class="assets__wrapper" id="assets"> <div class="assets__list"> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9738"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2024/" aria-label="CTA in Focus (September 2024)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/09/CTA-in-Focus_September-2024_Final_Page_1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/09/CTA-in-Focus_September-2024_Final_Page_1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/09/CTA-in-Focus_September-2024_Final_Page_1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2024/">CTA in Focus (September 2024)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9601"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-2024-summer-olympics-threat-assessment-july-2024/" aria-label="CTA 2024 Summer Olympics Threat Assessment (July 2024)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/07/CTA-2024-Olympics-Threat-Assessment-Supplemental-Report_Combined_rev_Page_01-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/07/CTA-2024-Olympics-Threat-Assessment-Supplemental-Report_Combined_rev_Page_01-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/07/CTA-2024-Olympics-Threat-Assessment-Supplemental-Report_Combined_rev_Page_01-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-2024-summer-olympics-threat-assessment-july-2024/">CTA 2024 Summer Olympics Threat Assessment (July 2024)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9556"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2024/" aria-label="CTA in Focus (June 2024)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/06/CTA-in-Focus_June-2024_FINAL_Page_1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/06/CTA-in-Focus_June-2024_FINAL_Page_1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/06/CTA-in-Focus_June-2024_FINAL_Page_1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2024/">CTA in Focus (June 2024)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9463"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cyber-threats-to-ngos/" aria-label="Cyber Threats to NGOs"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cyber-threats-to-ngos/">Cyber Threats to NGOs</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9445"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2024/" aria-label="CTA in Focus (March 2024)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/03/CTA-in-Focus_March-2024_Page_1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/03/CTA-in-Focus_March-2024_Page_1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/03/CTA-in-Focus_March-2024_Page_1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2024/">CTA in Focus (March 2024)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9251"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2023/" aria-label="CTA in Focus (December 2023)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/12/cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/12/cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/12/cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2023/">CTA in Focus (December 2023)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9070"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2023/" aria-label="CTA in Focus (September 2023)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/CTA-in-Focus-Sept-23-Cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/CTA-in-Focus-Sept-23-Cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/CTA-in-Focus-Sept-23-Cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2023/">CTA in Focus (September 2023)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-9059"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/how-emerging-technologies-threaten-our-cybersecurity/" aria-label="How Emerging Technologies Threaten Our Cybersecurity"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/Screenshot-2023-09-05-103808-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/Screenshot-2023-09-05-103808-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/09/Screenshot-2023-09-05-103808-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/how-emerging-technologies-threaten-our-cybersecurity/">How Emerging Technologies Threaten Our Cybersecurity</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-8926"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2023/" aria-label="CTA in Focus (June 2023)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/06/Cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/06/Cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/06/Cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2023/">CTA in Focus (June 2023)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-8855"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-at-a-glance/" aria-label="CTA at a Glance"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/05/CTA-At-A-Glance-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/05/CTA-At-A-Glance-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/05/CTA-At-A-Glance-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-at-a-glance/">CTA at a Glance</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-8592"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2023/" aria-label="CTA in Focus (March 2023)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Screenshot-2023-03-17-170206-445x576-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Screenshot-2023-03-17-170206-445x576-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Screenshot-2023-03-17-170206-445x576-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2023/">CTA in Focus (March 2023)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-8594"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/how-to-bake-cybersecurity-regulations-ingredients-for-better-results/" aria-label="How to Bake Cybersecurity Regulations: Ingredients for Better Results"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Bake-Cybersecurity-Results-445x576-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Bake-Cybersecurity-Results-445x576-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/04/Bake-Cybersecurity-Results-445x576-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/how-to-bake-cybersecurity-regulations-ingredients-for-better-results/">How to Bake Cybersecurity Regulations: Ingredients for Better Results</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-8573"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cyber-incident-reporting-framework-global-edition/" aria-label="Cyber Incident Reporting Framework: Global Edition"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/03/Screenshot-2023-05-01-143715-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/03/Screenshot-2023-05-01-143715-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/03/Screenshot-2023-05-01-143715-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cyber-incident-reporting-framework-global-edition/">Cyber Incident Reporting Framework: Global Edition</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-7361"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2022/" aria-label="CTA in Focus (December 2022)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/12/Cover-dec2022-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/12/Cover-dec2022-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/12/Cover-dec2022-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2022/">CTA in Focus (December 2022)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-7191"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cyber-incident-reporting-framework/" aria-label="Cyber Incident Reporting Framework"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Cyber-Incident-Reporting-Framework-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Cyber-Incident-Reporting-Framework-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Cyber-Incident-Reporting-Framework-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cyber-incident-reporting-framework/">Cyber Incident Reporting Framework</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-2169"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-value-proposition/" aria-label="CTA Value Proposition"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-value-proposition/">CTA Value Proposition</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-6875"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2022/" aria-label="CTA in Focus (September 2022)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-sept22-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-sept22-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/09/cover-sept22-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2022/">CTA in Focus (September 2022)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-6817"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-partnerships/" aria-label="CTA Partnership Programs"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/08/Cover-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/08/Cover-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/08/Cover-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-partnerships/">CTA Partnership Programs</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-6512"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2022/" aria-label="CTA in Focus (June 2022)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/cover-1-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/cover-1-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/cover-1-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2022/">CTA in Focus (June 2022)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-6014"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2022/" aria-label="CTA in Focus (March 2022)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/03/CTA-in-Focus-March-2022-Cover-1-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/03/CTA-in-Focus-March-2022-Cover-1-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/03/CTA-in-Focus-March-2022-Cover-1-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2022/">CTA in Focus (March 2022)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-5384"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2021/" aria-label="CTA in Focus (December 2021)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/01/CTA_in_focus_Dec-2021-002_Page_1-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/01/CTA_in_focus_Dec-2021-002_Page_1-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/01/CTA_in_focus_Dec-2021-002_Page_1-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2021/">CTA in Focus (December 2021)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-4330"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-membership-admission-requirements/" aria-label="CTA Membership Admission Requirements"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-1-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-1-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-1-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-membership-admission-requirements/">CTA Membership Admission Requirements</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-4210"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2021/" aria-label="CTA in Focus (September 2021)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-3-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-3-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/09/Cover-3-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2021/">CTA in Focus (September 2021)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-4057"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/closing-the-gap-expanding-cyber-deterrence/" aria-label="Closing the Gap: Expanding Cyber Deterrence"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/07/Closing-the-Gap-Expanding-Cyber-Deterrence-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/07/Closing-the-Gap-Expanding-Cyber-Deterrence-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/07/Closing-the-Gap-Expanding-Cyber-Deterrence-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/closing-the-gap-expanding-cyber-deterrence/">Closing the Gap: Expanding Cyber Deterrence</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-3955"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2021/" aria-label="CTA In Focus (June 2021)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/06/Cover-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/06/Cover-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/06/Cover-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2021/">CTA In Focus (June 2021)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-3837"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/2020-summer-olympics-threat-assessment2/" aria-label="Updated CTA 2020 Summer Olympics Threat Assessment (May 2021)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/05/Rev-Report-Cover-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/05/Rev-Report-Cover-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/05/Rev-Report-Cover-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/2020-summer-olympics-threat-assessment2/">Updated CTA 2020 Summer Olympics Threat Assessment (May 2021)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-3675"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2021/" aria-label="CTA In Focus (March 2021)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/CTA_in_focus_mar21-1-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/CTA_in_focus_mar21-1-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/CTA_in_focus_mar21-1-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2021/">CTA In Focus (March 2021)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-3507"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-threat-intelligence-sharing/" aria-label="CTA Threat Intelligence Sharing"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/02/data_slick_February_2021-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/02/data_slick_February_2021-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/02/data_slick_February_2021-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-threat-intelligence-sharing/">CTA Threat Intelligence Sharing</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-572"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-overview/" aria-label="CTA Overview: What Is The Cyber Threat Alliance?"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/01/Overview-cover_Page_1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/01/Overview-cover_Page_1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/01/Overview-cover_Page_1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-overview/">CTA Overview: What Is The Cyber Threat Alliance?</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-2815"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-solutions-fact-sheet/" aria-label="CTA Solutions Fact Sheet"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/09/Solutions-Fact-Sheet-image-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/09/Solutions-Fact-Sheet-image-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/09/Solutions-Fact-Sheet-image-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-solutions-fact-sheet/">CTA Solutions Fact Sheet</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-909"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-infographic/" aria-label="CTA Infographic"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/Cover-5-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/Cover-5-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/Cover-5-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-infographic/">CTA Infographic</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-3192"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2020/" aria-label="CTA In Focus (December 2020)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/CTA_in_focus_dec20-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/CTA_in_focus_dec20-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/CTA_in_focus_dec20-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-december-2020/">CTA In Focus (December 2020)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-2983"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2020/" aria-label="CTA in Focus (September 2020)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_September-2020-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_September-2020-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_September-2020-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-september-2020/">CTA in Focus (September 2020)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-2989"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2020/" aria-label="CTA in Focus (June 2020)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_June-2020-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_June-2020-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_June-2020-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-june-2020/">CTA in Focus (June 2020)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-2993"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2020/" aria-label="CTA in Focus (March 2020)"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_March-2020-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_March-2020-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/10/CTA-in-Focus_March-2020-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-in-focus-march-2020/">CTA in Focus (March 2020)</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-1076"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-joint-analysis-securing-edge-devices/" aria-label="Joint Analysis on Securing Edge Devices"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2019/04/CTA-Securing-Edge-Devices-Cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2019/04/CTA-Securing-Edge-Devices-Cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2019/04/CTA-Securing-Edge-Devices-Cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-joint-analysis-securing-edge-devices/">Joint Analysis on Securing Edge Devices</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-872"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/cta-illicit-cryptomining-whitepaper/" aria-label="Illicit CryptoMining Whitepaper"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Whitepaper-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Whitepaper-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Whitepaper-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/cta-illicit-cryptomining-whitepaper/">Illicit CryptoMining Whitepaper</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-824"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/wp-content-uploads-2018-09-cta-illicit-cryptomining-key-findings-pdf/" aria-label="Key Findings: The Illicit Cryptocurrency Mining Threat"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Key-Findings-1-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Key-Findings-1-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/09/CTA-Illicit-CryptoMining-Key-Findings-1-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/wp-content-uploads-2018-09-cta-illicit-cryptomining-key-findings-pdf/">Key Findings: The Illicit Cryptocurrency Mining Threat</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-696"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/adversary-playbook-principles-pdf/" aria-label="Adversary Playbook Principles"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/04/Screen-Shot-2018-06-25-at-5.36.30-PM-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/04/Screen-Shot-2018-06-25-at-5.36.30-PM-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/04/Screen-Shot-2018-06-25-at-5.36.30-PM-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/adversary-playbook-principles-pdf/">Adversary Playbook Principles</a></h3> </div> </article> <article class="asset__listitem post-listitem-asset animate" id="post-listitem-564"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/resources/assets/lucrative-ransomware-attacks-analysis-cryptowall-version-3-threat/" aria-label="Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Cryptowall_V3-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Cryptowall_V3-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Cryptowall_V3-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/resources/assets/lucrative-ransomware-attacks-analysis-cryptowall-version-3-threat/">Lucrative Ransomware Attacks: Analysis of the Cryptowall Version 3 Threat</a></h3> </div> </article> </div> <nav aria-label="Page navigation" class="pagination-wrap"> <ul class="pagination"> </ul> </nav> </div> </div> </section> </div> <footer class="footer__wrapper is-layout-constrained wp-block-group alignfull is-style-padded is-style-contrast"> <div class="footer footer__inner is-layout-flow wp-block-group alignwide"> <div class="footer__block footer__block__logo"> <a href="https://www.cyberthreatalliance.org"> <svg xmlns="http://www.w3.org/2000/svg" width="286" height="110" viewBox="0 0 286 110"><g fill="none" fill-rule="evenodd"><g fill-rule="nonzero"><path d="m125.8 106 1.7-4.6h7.7l1.6 4.6h3.6l-7.5-20h-3.1l-7.6 20h3.6Zm8.4-7.4h-5.8l3-8.3 2.8 8.3Zm21 7.4v-2.8h-9V86.1h-3.5V106h12.5Zm15.1 0v-2.8h-9V86.1h-3.5V106h12.5Zm6.3 0V86h-3.4v20h3.4Zm6.3 0 1.6-4.6h7.7l1.7 4.6h3.6l-7.6-20h-3l-7.6 20h3.6Zm8.4-7.4h-5.8l2.9-8.3 2.9 8.3Zm11.9 7.4V91.9l8.9 14.1h3.4V86h-3.4v14.3L203.2 86h-3.5V106h3.5Zm23.8.3a8 8 0 0 0 5.5-1.8 7.2 7.2 0 0 0 2.3-5h-3.4c-.2 1.4-.7 2.5-1.3 3-.7.7-1.7 1-3.1 1-1.5 0-2.6-.6-3.4-1.7a8.7 8.7 0 0 1-1.1-5v-1.7c0-2.1.4-3.7 1.2-4.8a4 4 0 0 1 3.5-1.7c1.3 0 2.2.3 3 1 .6.6 1 1.6 1.2 3h3.4c-.2-2.1-1-3.8-2.3-5a7.7 7.7 0 0 0-5.3-1.8 7.5 7.5 0 0 0-7.2 4.5c-.7 1.4-1 3-1 5V97c0 1.8.4 3.5 1 4.8a7.4 7.4 0 0 0 7 4.4Zm24-.3v-2.8h-9.6v-6h8.1v-2.8h-8.1v-5.5h9.4V86H238V106h13Z" fill="#6E6F72"></path><path d="M136.8 37.4c3.5 0 6.4-.9 8.6-2.8 2.1-1.8 3.3-4.4 3.6-7.8h-5.4c-.3 2.3-1 3.8-2 4.8s-2.7 1.4-4.8 1.4a6 6 0 0 1-5.3-2.6 13.7 13.7 0 0 1-1.9-7.8V20c0-3.4.7-5.9 2-7.6 1.3-1.7 3-2.6 5.4-2.6 2 0 3.6.5 4.7 1.5 1 1 1.7 2.6 2 4.9h5.3c-.3-3.5-1.5-6.1-3.6-8a12 12 0 0 0-8.4-2.8 11.8 11.8 0 0 0-11.3 7c-1 2.3-1.5 4.9-1.5 7.8v3c0 2.8.6 5.3 1.6 7.5a11.6 11.6 0 0 0 11 6.8Zm30-.4V25.5l10.5-19.8h-6l-7.2 14.8L157 5.7h-6l10.5 19.8V37h5.4Zm25.3 0c3.5 0 6.2-.8 8.1-2.4A8.3 8.3 0 0 0 203 28c0-1.8-.4-3.3-1.3-4.6a6.9 6.9 0 0 0-4-2.6 7.5 7.5 0 0 0 3.4-2.6 6.8 6.8 0 0 0 1.2-4c0-2.7-1-4.8-2.8-6.3a13 13 0 0 0-8-2h-10.8V37h11.4Zm-.6-18.1h-5.3V10h5.2c1.9 0 3.3.3 4.2 1 .8.7 1.3 1.8 1.3 3.4a4 4 0 0 1-1.5 3.2c-1 .8-2.2 1.2-4 1.2Zm.7 13.8h-6v-9.8h6.4c3.4 0 5 1.7 5 5 0 1.5-.5 2.6-1.4 3.5-1 .8-2.3 1.3-4 1.3Zm36.7 4.3v-4.3h-15V23h12.9v-4.3h-12.9v-8.6h14.9V5.7h-20.3V37h20.4Zm9.9 0V25h6l6.3 12h5.8v-.3l-7-13a9.6 9.6 0 0 0 4.2-3.3c1-1.4 1.6-3.1 1.6-5.2 0-3-1-5.4-3-7-2-1.7-4.7-2.5-8.3-2.5h-11V37h5.4Zm5.6-16.4h-5.6V10h5.7c2 0 3.3.5 4.3 1.4 1 1 1.4 2.2 1.4 4 0 1.5-.5 2.8-1.5 3.7-1 1-2.5 1.4-4.3 1.4ZM138 76V49.1h9.8v-4.4H123v4.4h9.6V76h5.4Zm19.3 0V62.1h14V76h5.4V44.7h-5.4v13h-14v-13H152V76h5.4Zm31.3 0V64h6l6.3 12h5.8v-.3l-7-13a9.6 9.6 0 0 0 4.2-3.3c1-1.4 1.5-3.1 1.5-5.2 0-3-1-5.4-2.9-7-2-1.7-4.7-2.5-8.4-2.5h-11V76h5.5Zm5.6-16.4h-5.6V49h5.7c2 0 3.3.5 4.3 1.4 1 1 1.4 2.2 1.4 4 0 1.5-.5 2.8-1.5 3.7-1 1-2.5 1.4-4.3 1.4ZM231 76v-4.3h-15V62h12.8v-4.3H216v-8.6H231v-4.4h-20.3V76h20.5Zm7.2 0 2.6-7.3h12l2.6 7.3h5.7l-11.8-31.3h-4.9L232.7 76h5.6Zm13.2-11.7h-9.1l4.5-13 4.6 13ZM275 76V49.1h9.8v-4.4H260v4.4h9.6V76h5.4Z" fill="#FF6700"></path></g><path fill="#6E6F72" d="m41 95.3 15.8 14.3 52.6-55.5-38-37.2-13.2 14.2 21.4 23z"></path><path fill="#FF6700" d="M68.4 14.3 52.6 0 0 55.5l38 37.2 13.3-14.2-21.5-23z"></path></g></svg> <span class="screen-reader-text">Cyber Threat Alliance</span> </a> <div class="footer-social"> <ul> <li> <a href="https://www.facebook.com/CyberThreatAlliance" target="_blank" rel="noopener"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM47.59,24.94H44c-2.82,0-3.37,1.34-3.37,3.3v4.33h6.72l-.87,6.78H40.63V56.76h-7V39.35H27.77V32.57h5.86v-5c0-5.8,3.55-9,8.72-9a48.45,48.45,0,0,1,5.24.27Z"/></svg> <span class="screen-reader-text">Facebook</span> </a> </li> <li> <a href="https://twitter.com/CyberAlliance" target="_blank" rel="noopener"> <?xml version="1.0" encoding="UTF-8"?><svg id="a" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><defs><style>.b{stroke-width:0px;}</style></defs><path class="b" d="m0,0v75.36h75.36V0H0Zm44.88,54.67l-9.09-11.88-10.4,11.88h-5.77l13.47-15.39-14.21-18.58h11.89l8.21,10.86,9.5-10.86h5.76l-12.59,14.39,14.81,19.59h-11.6Z"/><polygon class="b" points="25.62 23.96 46.47 51.22 49.66 51.22 29.04 23.96 25.62 23.96"/></svg> <span class="screen-reader-text">X</span> </a> </li> <li> <a href="https://www.youtube.com/channel/UCKF94z58tZRp9kBLJmjzVzA" target="_blank" rel="noopener"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM60.83,39.4307a70.1774,70.1774,0,0,1-.4615,7.4964s-.4529,3.1918-1.8448,4.5939a6.6264,6.6264,0,0,1-4.6388,1.9619c-6.4748.4616-16.2051.4789-16.2051.4789S25.6448,53.8533,21.9364,53.5c-1.03-.2-3.3452-.136-5.1089-1.9808-1.3833-1.4021-1.8362-4.5939-1.8362-4.5939a70.4272,70.4272,0,0,1-.4615-7.4963V35.9206a70.2114,70.2114,0,0,1,.4615-7.4963s.4428-3.1919,1.8362-4.5939a6.6281,6.6281,0,0,1,4.6387-1.962c6.4748-.47,16.1965-.47,16.1965-.47H37.68s9.7217,0,16.1965.47a6.6281,6.6281,0,0,1,4.6387,1.962c1.3919,1.402,1.8448,4.5939,1.8448,4.5939v.0014a71.7609,71.7609,0,0,1,.47,7.4963Z" fill="#017bb6"/><polygon points="32.888 43.689 45.395 37.205 32.888 30.676 32.888 43.689" fill="#017bb6"/></svg> <span class="screen-reader-text">YouTube</span> </a> </li> <li> <a href="https://www.linkedin.com/company/cyber-threat-alliance/" target="_blank" rel="noopener"> <svg viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM25.83,57.93h-8.9V29.33h8.9ZM21.38,25.42a5.16,5.16,0,1,1,5.15-5.16A5.15,5.15,0,0,1,21.38,25.42ZM59.14,57.93H50.25V44c0-3.32-.06-7.59-4.62-7.59s-5.33,3.61-5.33,7.34V57.93H31.41V29.33h8.53v3.91h.12a9.34,9.34,0,0,1,8.42-4.62c9,0,10.66,5.92,10.66,13.63Z"/></svg> <span class="screen-reader-text">Linked In</span> </a> </li> </ul> </div> </div> <nav class="footer__block footer-menu"> <ul > <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7943 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/about/">About CTA</a> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7949"> <a href="https://www.cyberthreatalliance.org/about/who-we-are/">Who We Are</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8441"> <a href="https://www.cyberthreatalliance.org/about/board-of-directors/">Board of Directors</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8439"> <a href="https://www.cyberthreatalliance.org/about/testimonials/">Testimonials</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8440"> <a href="https://www.cyberthreatalliance.org/about/our-sharing-model/">Our Sharing Model</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8443"> <a href="https://www.cyberthreatalliance.org/membership/">Membership</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7944"> <a href="https://www.cyberthreatalliance.org/news/">News</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8445"> <a href="https://www.cyberthreatalliance.org/partnerships/">Partnerships</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-page-ancestor menu-item-8446"> <a href="https://www.cyberthreatalliance.org/resources/">Resources</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8444"> <a href="https://www.cyberthreatalliance.org/contact/">Contact</a> </li> </ul> </nav> <nav class="footer__block footer-menu"> </nav> </div> </footer> <div class="footer__meta__wrapper is-layout-constrained wp-block-group alignfull is-style-padded is-style-contrast"> <div class="footer__meta footer__meta__inner is-layout-flow wp-block-group alignwide"> <p>© Copyright 2024 Cyber Threat Alliance | <span class="footer-credit">Web Development by <a href="https://beamandhinge.com">Beam & Hinge</a></span></p> </div> </div> </div> <script src="https://www.cyberthreatalliance.org/wp-content/plugins/sg-cachepress/assets/js/lazysizes.min.js" id="siteground-optimizer-lazy-sizes-js-js"></script> <script id="app/0-js-before" nonce="9c2ee6cfeb"> (()=>{"use strict";var r,e={},o={};function t(r){var n=o[r];if(void 0!==n)return n.exports;var a=o[r]={exports:{}};return e[r](a,a.exports,t),a.exports}t.m=e,r=[],t.O=(e,o,n,a)=>{if(!o){var i=1/0;for(v=0;v<r.length;v++){o=r[v][0],n=r[v][1],a=r[v][2];for(var s=!0,f=0;f<o.length;f++)(!1&a||i>=a)&&Object.keys(t.O).every((r=>t.O[r](o[f])))?o.splice(f--,1):(s=!1,a<i&&(i=a));if(s){r.splice(v--,1);var l=n();void 0!==l&&(e=l)}}return e}a=a||0;for(var v=r.length;v>0&&r[v-1][2]>a;v--)r[v]=r[v-1];r[v]=[o,n,a]},t.d=(r,e)=>{for(var o in e)t.o(e,o)&&!t.o(r,o)&&Object.defineProperty(r,o,{enumerable:!0,get:e[o]})},t.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r={666:0};t.O.j=e=>0===r[e];var e=(e,o)=>{var n,a,i=o[0],s=o[1],f=o[2],l=0;if(i.some((e=>0!==r[e]))){for(n in s)t.o(s,n)&&(t.m[n]=s[n]);if(f)var v=f(t)}for(e&&e(o);l<i.length;l++)a=i[l],t.o(r,a)&&r[a]&&r[a][0](),r[a]=0;return t.O(v)},o=self.webpackChunksage=self.webpackChunksage||[];o.forEach(e.bind(null,0)),o.push=e.bind(null,o.push.bind(o))})()})(); </script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/575.baac18.js" id="app/0-js"></script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/643.3043e9.js" id="app/1-js"></script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/app.b6caba.js" id="app/2-js"></script> </body> </html>