Version History

This section provides details about version releases of Seqrite Threat Intel over time.

Versions

Version 2.1

  • Added Multi-Factor Authentication (MFA) support: Users can now secure accounts with an extra verification step.
  • Support for STIX/TAXII 2.0 feed URL: Users can now pull threat intelligence feeds using TAXII 2.0 URLs.
  • Added bulk IOC upload support for faster submission of multiple IOCs at once.
  • Duplicate IOC Submission Handling: System now detects and blocks repeated IOC submissions.
  • Added Forgot Password functionality to enhance account recovery and improve user experience.
  • Introduced Audit Log section: Included Audit Log section to track and record user login, logout and forgot password
    activities for improved accountability and transparency.
  • Enhanced real-time IOC risk scoring.
  • Vulnerability Intelligence now displays severity scores according to CVSS 2.0, CVSS 3.x, and CVSS 4.0 standards.
  • Zero Day Vulnerabilities are now displayed in the portal, and the tag is automatically removed once a patch is release.

Version 2.0.2

  • IOC Risk Score Lifecycle: The lifecycle of an IOC’s risk score is now made available to the users in form of a graph.
  • Victimology: Victimology is the study of who attackers target, helping analysts understand patterns across victims, such as industries, and regions

Version 2.0.1

  • Introduced sector–based IOC segregation: Indicators of Compromise (IOCs) are now organized according to tenant sector, allowing users to view both the complete IOC list and sector-specific IOC for improved clarity and analysis.

Version 2.0

  • Seqrite Threat Intel (STI)- Seqrite Malware Analysis Platform (SMAP) Integration: This integration allows users to analyze suspicious files within SMAP and securely share any detected malware or ransomware with the STI community.
  • Improved Intel submission workflow: Improved workflow enables faster threat intel sharing within community. The submitted intel will be validated before being shared.
  • Enhanced IOC Enrichment: IOCs are enriched with additional attributes for improved investigation.

Version 1.4

  • Seqrite Threat Intel is now accessible from Seqrite’s Centralized Security Management Platform (CSM).
  • Addition of reliable OSINT and Enrichment in feeds.
  • Introduced licensing for STI on-prem support.

Version 1.3

  • Included section on Reports (RSS Feeds and Blogs) and Adversaries on Intrusion Sets (APT, Ransomware and Campaigns) and minor enhancements for improving usability.

Version 1.2

  • STIX – TAXII v2.1: Intel will be shared over TAXII and as per the recommended Industry standard that is STIX v2.1.
  • Included section on Intel Submissions.
  • Organization and User Management: Super admins have the provision to add Organizations and respective Organization Admins to have the option to add / disable users and assign roles and permissions to their respective organization users.
  • Export: Users can export Threat Intel’s in CSV format.

Version 1.1

  • Vulnerability Intelligence: Vulnerability intelligence provides insights into newly discovered vulnerabilities, including severity, exploitability, and affected systems. It
    includes patch details, associations with known threats. This helps organizations proactively mitigate security gaps and strengthen their defenses.
  • Adversaries: This intel offers a comprehensive view of threat actors, including their tactics, techniques, and associations. It helps in understanding attacker motives,
    targeted regions and targeted sectors. Organizations can use this intelligence to anticipate attacks and enhance threat-hunting capabilities.

Version 1.0

  • Dashboard: Dashboard gives a glimpse of predefined metrics to provide insights into the IoCs, Vulnerabilities and Adversaries detected.
  • Indicators: Indicators provides a detailed overview of all newly detected indicators of compromise (IoC). IoC includes IP addresses, domain names, file hashes, and URLs
    that can be used to detect malicious activity. These indicators help to detect, analyse and respond to cyber threats effectively. This can be ingested by various controls for taking required actions. Seqrite provides actionable recommendations against the IOC reports.
  • Admin Settings
  • Added Login Page, User Profile, and About Us sections for improved user experience.
Was this page helpful?