Table of Contents
This section of Google Threat Intelligence Reports & Analysis section provides in-depth, continuously updated reports on a wide range of cybersecurity topics. Google Threat Intelligence reports are written and curated by Community contributions and Google Threat Intelligence analysts, leveraging their expertise and access to vast amounts of data to provide actionable insights for security professionals and organizations.
Prerequisites
Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Actions
Reports
Google Threat Intelligence’s Reports & Analysis feature provides Google Threat Intelligence reports that are written and curated by Community contributions and Google Threat Intelligence analysts, leveraging their expertise and access to vast amounts of data to provide actionable insights for security professionals and organizations.
Prerequisites
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Steps
- On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Reports and Analysis.
- The Reports page will appear, with three sections:
- Search Query bar
- Filters
- Reports list
- At the top left of the page users can see the Search Query bar. Here users can enter searches by:
- Name
- Owner
- Description
- Tags
- Below the Search Query bar users will see the Filter selection dropdown lists.
- The first Filter is an important selection as it is where users can select the Origin of the Report.
- The first tab selection dropdown list is where users can select where the Report is sourced from. Users can select Reports from:
- Google Threat Intel
- Google Threat Intelligence Reporting
- Partner
- Peer Threat Intelligence Reporting
- Crowd-sourced
- Open-source (OSINT) Reporting
- Google Threat Intel
- These selections can help users determine the confidence in the reporting, and establish the trustworthiness of the intelligence information.
- The remaining Filters can allow users to select from a variety of options:
- Industries
- Target Regions
- Source Regions
- Threat Category
- Creation Date
- Lookups Trends
- Below the Filters is the Reports section, that consists of Summary and Activity information.
- Each Report in the list has the following information in the List view:
- Title
- Origin (Source Type)
- Number of IOCs associated
- Update Date/Time Group
- Activity Graph
- Users will select a Report and a popup page will appear. At the top of the popup page, users will see the Report Overview with the following options:
- Follow
- Share & Visibility
- Download
- Open in Graph
- Below the Report Overview, users will see the following tabs:
- Summary consisting of:
- Report’s Info
- Description
- Details
- Last 2 weeks Activity
- Targets
- Timeline
*The Summary selection of Partner Origin page will have additional information of: - Associations
- Other Sightings
*The Summary selection of the Google Threat Intelligence Origin page will have additional information of: - Associations
- Relevant Reporting
- Content
- Associations
- IOCs
- Activity
- Rules
- TTPs (MITRE ATT&CK layout)
- Reporting
- Community
- Summary consisting of:
- The TTPs selection will allow users to see the TTPs in MITRE ATT&CK layout by Operational or Seen in IOCs views.
- To the right of the Search Query bar in TTPs page, users will see an option to select Open in MITRE Navigator, which will allow users to see the associated TTPs in MITRE ATT&CK’s ATT&CK Navigator, which will allow MITRE to see the associated TTPs.
- There will be a popup warning users that the Open in MITRE Navigator selection will allow a Third-Party to see the TTPs associated with the reporting.
Relevant Documentation Links
You have completed your Google Threat Intelligence Journey!
For those who seek to learn more, feel free to search and discover more about the platform in our Google Threat Intelligence Documentation Hub - located here: https://gtidocs.virustotal.com/
You'll find comprehensive guides and documentation to help you start working with Google Threat Intelligence as quickly as possible, as well as support if you get stuck.
For technical support, you can reach Google Threat Intelligence’s Help Center, located here: https://www.virustotal.com/gui/contact-us/technical-support
Previous Step: Google Threat Intelligence: Step 4 - Dissemination Overview