Guide to Synapse and Storm Resources
Merging Threat Clusters (Threat Clusters Part 2)
Getting Set up with Synapse Power-Ups
Getting Started with a Synapse Demo Instance
Investigating an Unfamiliar File with Synapse
What is a Threat Cluster? (Threat Clusters Part 1)
Vertex Intel Sharing Community - FAQ
Using Spotlight Extractors for Arbitrary Data
Vertex Intel Sharing: Sinkhole Infrastructure Research
Capturing Structured Data in Spotlight with the Table Extractor
Using the Synapse-Mitre-Attack Power-Up to Ask Questions of the MITRE ATT&CK Framework
From Group to Individual: Modeling InformNapalm’s Article on Sergey Morgachev of APT28
Tips and Tricks: Storm and the Synapse UI
Best Practices for Views and Layers
Using Synapse to Investigate Suspected Credential Theft Activity
Using the Vertex-Threat-Intel Power-Up Workflow
Leveraging DNS Suffix Data for Threat Clustering
Analyzing Two of Russia's Military Intelligence Units with Synapse
Analyzing a Suspected Russian Influence Operation with Synapse
Using the Synapse-Twitter Power-Up to Ingest IOCs Shared via Twitter
Automating Power-Ups to Aid Data Ingest, Enrichment, and Analysis
Vertex Tag Tree Overview
Supercharge Your Analysis with Synapse Power-Ups
Preserving Analysts’ Sanity by Automating Sinkhole Monitoring
Importing Data Doesn’t have to be hard: Transferring Structured Data at Scale with Csvtool