Get Ahead of
Cyber Threats
Product

What are Major Threats?

Kenisha Liu
Reading time: 3 min.

When your CFO stops by your desk with concerns about a trending threat, it’s a scramble to find answers. You have to identify the relevant CVEs or indicators associated with the threat, comb through each one, correlate your findings with your data to see if you’re impacted, and if you are then do the research to figure out how to fix things. Just one threat can consume your whole day. And you’re left playing catch up tomorrow on top of an already growing backlog of threats. 

The next time your CFO stops by your desk, you can send him a quick snapshot letting him know it’s already taken care of.

It’s not a fantasy, it’s Fletch’s Major Threats.

Major Threats cuts out endless hours of manual work by filtering and grouping the landscape to encompass only the relevant threats for you. The next time your CFO stops by, you’ll have instant answers in understandable terms. Let’s dive into what Fletch Major Threats are and how it saves you significant time, money, (and a headache).

 

 

What are Major Threats?

Major Threats are the few threats that matter right now based on the collective wisdom of the cybersecurity community.

How? 

  1. Fletch scours the entire threat landscape. Fletch’s natural language engine processes tens of thousands of threat articles and hundreds of thousands of indicators daily to determine the pulse of the entire landscape, and select the few threats that matter most before the world catches on. These are the Major Threats.
  2. Fletch makes browsing Major Threats simple. The Fletch engine intelligently transforms thousands of threat indicators (CVEs and malware hashes) that have to do with the same threat together. Get a quick snapshot of a threat from the moment it emerged to the present day. No more countless hours sorting duplicate articles or vast indicators. 
  3. Fletch tracks every detail and every evolution of a threat like no one else.  You’ll know the exact stage, what technologies, industries, geographies a given threat is targeting at any given time, as well as severity based on the sentiment of the cybersecurity community right now. Plus, you’ll get the advice you need to stay ahead at each threat so you're never surprised. It’s a lot of detail, but Fletch Threat Boards make it easy to take in. 

Then Fletch correlates Major Threats with your Fletch Data Profile to produce your correlated Fletch feed and Daily Threat Report sent right to your inbox.

Fletch Feed > View All Major Threats

 

The process today

Today, teams, big and small, are set up for failure. Much of this process is endless and manual. Many typically start their morning with a couple hours-long effort scrolling through threat forums, blogs, and tweets to look for new and emerging threats. Cherry pick a few that look interesting to them, missing the ones that are probably most important to them, and then do the manual labor of seeing if any are relevant to their organization. 

Alternatively, overwhelmed teams might choose to focus on their massive list of vulnerabilities, but even doing that means they aren’t focusing on any  timely, relevant threats. Vulnerability scanners and EDR systems alert users without the needed context of what matters most right now. You could be wasting your time patching a vulnerability that hasn’t mattered since 2015.

Whatever your process is today, it is super time consuming, and likely keeps you stuck in the past. It’s time to look towards the future. Fletch cuts out the work to give you the few threats that matter daily, and helps you focus on the threats that are just emerging so you can get a jump on tomorrow

 

   The Manual Way  The Fletch Way
 Cyberthreats Daily Sort through 1000’s of duplicate threats and indicators 10-20 Major Threats that emerged/evolved today
 Cost per month Wicked Expensive: 50K+ in people, tools, and processes to do it right Cost Effective: $1000 all in- totally automated
 Time spent per day Hours to scratch the surface Minutes to be done

 

Major Threats Features

Become an expert on the threat landscape with the help of our AI Engine. Fletch’s All Major Threats tab gives you the lowdown on every threat, emerged or evolved in the last 30 days.

By default, the table will be sorted by what’s emerged most recently. However, you can sort also sort by Major Threat movement:

  • New today
  • Changed since yesterday

All Major Threats Page

 

When you want to see the threats through the lens of your world, filter it by correlation type — malware, vulnerabilities, internal tech, external tech, industry, geo, or no correlation. The table will automatically sort by highest count of correlations to lowest.

You can slice and dice the threat landscape to whatever threats are most important to you. Whether that's selecting multiple correlations or by filtering by both correlation type and Major Threat movement. You can also do the inverse and hide any information that you don’t want to see. Currently we track:

  1. Maturity
  2. Chatter
  3. Emerged
  4. Updated
  5. Total IOCs in collection
  6. Correlation
  7. Marked as (based on user action)
  8. Impacted resources
  9. Impacted people
  10. Total Correlated IOCs
  11. Total Correlated properties 
  12. Correlated malware
  13. Correlated vulns
  14. Correlated internal tech
  15. Correlated external tech
  16. Correlated industry
  17. Correlated geo

Any threat that has not evolved in the last 30 days will stop appearing in the Major Threats feed so that you won’t be bogged down by threats that no longer matter and your workload will always remain manageable and intentional.

 

Takeaway

Fletch focuses your efforts on what truly matters. Major Threats will cut out massive amounts of a given day of searching, triaging, and correlating threats for you. We do the work at a higher degree and make advanced cybersecurity accessible. It’s time to start cost effectively living ahead.

Sign up for the Fletch waitlist to get every major threat in your hands.

 

Fletch CTA Banner - Get a Demo