Threat Intelligence Blog

Research, analysis, and insights from the DugganUSA threat intelligence team.

What Is Threat Intelligence and How Does It Work in Cybersecurity?

2026-04-02 • Patrick Duggan

DugganUSA explains threat intelligence: how IOCs are collected, analyzed, and distributed through automated cascade pipelines to protect organizations at machine speed.

Read more →

Latest Trends in Threat Intelligence Research: Pattern 38 and Supply Chain Attacks

2026-04-02 • Patrick Duggan

DugganUSA research on the latest threat intelligence trends including Pattern 38 supply chain attacks, AIPM methodology, and behavioral threat scoring frameworks.

Read more →

How to Evaluate the Quality of Cybersecurity Research Reports

2026-04-02 • Patrick Duggan

A framework for evaluating cybersecurity research quality: machine-readable IOCs, MITRE ATT&CK mappings, kill chain analysis, reproducible methodology, and timeliness.

Read more →

How Security Automation Improves Business Protection: 5.37M Autonomous Decisions

2026-04-02 • Patrick Duggan

DugganUSA explains how security automation protects US businesses with 5.37M autonomous decisions, real-time SIEM integration, and automated threat blocking.

Read more →

Free Threat Intelligence Services in the US: DugganUSA STIX Feed

2026-04-02 • Patrick Duggan

DugganUSA offers free threat intelligence services in the US including a STIX 2.1 feed with 1M+ IOCs, OPNsense blocklists, and SIEM integration guides.

Read more →