CORE FEATURES
Threat Flow
Conversation Explorer
7min
what is conversation explorer? conversation explorer is a powerful add on feature to threat flow that enhances dark web browsing capabilities it helps you explore cybercrime chatter with automated conversation summaries, transforming unstructured discussions into clear, structured insights for easier browsing and action for access to conversation explorer , contact your csm browsing the left hand panel shows summarized conversations from your searches, distilling multiple cybercrime interactions threat flow identifies targeted organizations, discussed products (if any), mentioned locations, and other metadata search best practices use specific terminology whenever possible, using specific terms when performing semantic searches can significantly improve the resulting discussions and or relevance of the topics being discussed the following are some common suggestions finance use specific terms such as bank credentials , bin numbers , cryptocurrencies , or institution names ransomware include terms similar to ransomware group , ransomware activities , ransomware recruitment , or known threat actors such as lockbit or cl0p critical infrastructure use terms like energy sector , telecommunications , internet providers , military , government " and transportation create intel for specific topics of interests avoid overly specific or "mixed topic" queries for the most relevant results include specific ttps, vectors, and vulnerabilities of interest some examples include phishing , vpn , brute force , reverse shell , or cve 2024 xxx reading threads conversation explorer allows you to go directly to the source and read the relevant threads of discussion just click the threads tab on any conversation creating intel explorer enables you to create custom intel within threat flow using the custom intel builder, allowing you to select conversations relevant to your research and organize them in a dedicated section this powerful feature helps you streamline and focus on critical information start with a search use explorer's semantic search to look for topics like "healthcare sensitive data " apply filters, such as date (last 7 days) , to refine results select conversations of interest click the + next to a conversation to add it to your selection preview your intel click build custom intel to review selected conversations add more conversations through additional searches or remove them using the x create your intel click create custom intel in the build custom intel panel name your intel, and it will be automatically added to the intel tab processing takes a few minutes your intel will summarize all selected conversations, provide related discussions, and list relevant events, ensuring a structured and actionable view of cybercrime intelligence how do i save my searches? you can use threat flow's saved feeds feature to save different combinations of queries and filters for quick access read more about saved queries docid 46lwybaeo5d5qqjpgqb4u