{"id":3159,"date":"2025-10-28T14:53:34","date_gmt":"2025-10-28T14:53:34","guid":{"rendered":"https:\/\/phishia.fr\/?p=3159"},"modified":"2025-11-25T14:00:54","modified_gmt":"2025-11-25T14:00:54","slug":"cyber-threat-intelligence-cti-simple-definition-concrete-examples","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/cyber-threat-intelligence-cti-simple-definition-concrete-examples\/","title":{"rendered":"Cyber Threat Intelligence (CTI): simple definition, concrete examples."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3159\" class=\"elementor elementor-3159\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb756c3 e-flex e-con-boxed e-con e-parent\" data-id=\"fb756c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41fa117 elementor-widget elementor-widget-text-editor\" data-id=\"41fa117\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Visit <strong data-start=\"1005\" data-end=\"1034\">cyber threat intelligence<\/strong> (CTI) is the ability to <strong data-start=\"1059\" data-end=\"1093\">collect, process and analyze<\/strong> information on threats to <strong data-start=\"1132\" data-end=\"1162\">decide faster and better<\/strong>. In concrete terms: detect ID leaks, anticipate phishing\/ransomware campaigns, prioritize patches and trigger the right actions (SIEM\/EDR, takedown, MFA). At <strong data-start=\"1349\" data-end=\"1360\">Phishia<\/strong>we transform these signals into <strong data-start=\"1391\" data-end=\"1415\">measurable results<\/strong> for SMEs, ETIs and local authorities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-918581f e-flex e-con-boxed e-con e-parent\" data-id=\"918581f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cffba6e elementor-widget elementor-widget-heading\" data-id=\"cffba6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence: why adopt it now?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6751669 e-flex e-con-boxed e-con e-parent\" data-id=\"6751669\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d98970b elementor-widget elementor-widget-text-editor\" data-id=\"d98970b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threats evolve quickly, and IoCs change frequently. Without CTI, we <strong data-start=\"1723\" data-end=\"1733\">reacts<\/strong> after the fact. With the <strong data-start=\"1754\" data-end=\"1783\">cyber threat intelligence<\/strong>we <strong data-start=\"1788\" data-end=\"1800\">anticipates<\/strong> we know <strong data-start=\"1811\" data-end=\"1818\">which<\/strong> is interested in us, <strong data-start=\"1839\" data-end=\"1850\">how<\/strong> it operates (TTP), <strong data-start=\"1867\" data-end=\"1876\">when<\/strong> campaign intensifies, and <strong data-start=\"1907\" data-end=\"1913\">where<\/strong> take priority action (compromised identifiers, resold access, exploited vulnerabilities).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d61f359 e-flex e-con-boxed e-con e-parent\" data-id=\"d61f359\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25d4ecb elementor-widget elementor-widget-heading\" data-id=\"25d4ecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong data-start=\"582\" data-end=\"653\">Strategic, tactical and operational CTI: definitions and uses<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3accd3a e-flex e-con-boxed e-con e-parent\" data-id=\"3accd3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48775d7 elementor-widget elementor-widget-text-editor\" data-id=\"48775d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2063\" data-end=\"2194\"><p data-start=\"2065\" data-end=\"2194\"><strong data-start=\"2065\" data-end=\"2080\">Strategic<\/strong> macro vision for decision-makers (trends, players, sectoral risks) to guide investments.<\/p><\/li><li data-start=\"2195\" data-end=\"2311\"><p data-start=\"2197\" data-end=\"2311\"><strong data-start=\"2197\" data-end=\"2222\">Operational\/Tactical<\/strong> understanding <strong data-start=\"2243\" data-end=\"2250\">TTP<\/strong> and preparation of defenses (SIEM, detections, playbooks).<\/p><\/li><li data-start=\"2312\" data-end=\"2437\"><p data-start=\"2314\" data-end=\"2437\"><strong data-start=\"2314\" data-end=\"2327\">Technical<\/strong> : <strong data-start=\"2330\" data-end=\"2345\">indicators<\/strong> concrete (IP, domains, hashes, signatures) for <strong data-start=\"2395\" data-end=\"2420\">configure radars<\/strong> and block quickly.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb43c8c e-flex e-con-boxed e-con e-parent\" data-id=\"eb43c8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79bc84a elementor-widget elementor-widget-heading\" data-id=\"79bc84a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real-life examples (phishing, ransomware, fraud) how CTI changes everyday life<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d31f313 e-flex e-con-boxed e-con e-parent\" data-id=\"d31f313\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fa310d elementor-widget elementor-widget-text-editor\" data-id=\"8fa310d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2637\" data-end=\"2738\"><p data-start=\"2639\" data-end=\"2738\"><strong data-start=\"2639\" data-end=\"2664\">ID leaks<\/strong> : targeted resets, MFA reinforcement, abnormal use alerts.<\/p><\/li><li data-start=\"2739\" data-end=\"2837\"><p data-start=\"2741\" data-end=\"2837\"><strong data-start=\"2741\" data-end=\"2765\">Resale VPN access<\/strong> (dark web): immediate blocking, secret rotation, lateral hunting.<\/p><\/li><li data-start=\"2838\" data-end=\"2942\"><p data-start=\"2840\" data-end=\"2942\"><strong data-start=\"2840\" data-end=\"2868\">Branded phishing kits<\/strong> takedown, DNS\/MTA\/proxy filtering, awareness-raising among target teams.<\/p><\/li><li data-start=\"2943\" data-end=\"3043\"><p data-start=\"2945\" data-end=\"3043\"><strong data-start=\"2945\" data-end=\"2974\">Exploited vulnerabilities<\/strong> patch prioritized according to actual use (not just score).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a97e13 e-flex e-con-boxed e-con e-parent\" data-id=\"3a97e13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec48b7f elementor-widget elementor-widget-heading\" data-id=\"ec48b7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Flare + Phishia: from signal to measurable action<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e11889b e-flex e-con-boxed e-con e-parent\" data-id=\"e11889b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb07dbf elementor-widget elementor-widget-text-editor\" data-id=\"cb07dbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3107\" data-end=\"3222\">We use <strong data-start=\"3122\" data-end=\"3131\">Flare<\/strong> to detect leaks, resale access and criminal signals. <strong data-start=\"3193\" data-end=\"3204\">Phishia<\/strong> does the rest:<\/p><ol data-start=\"3223\" data-end=\"3500\"><li data-start=\"3223\" data-end=\"3282\"><p data-start=\"3226\" data-end=\"3282\"><strong data-start=\"3226\" data-end=\"3243\">Qualification<\/strong> (filtering, validity, business impact),<\/p><\/li><li data-start=\"3283\" data-end=\"3327\"><p data-start=\"3286\" data-end=\"3327\"><strong data-start=\"3286\" data-end=\"3298\">Context<\/strong> (actors, TTP, campaigns),<\/p><\/li><li data-start=\"3328\" data-end=\"3407\"><p data-start=\"3331\" data-end=\"3407\"><strong data-start=\"3331\" data-end=\"3355\">Decision &amp; execution<\/strong> (IoC \u2192 <strong data-start=\"3363\" data-end=\"3375\">SIEM\/EDR<\/strong>Sigma, YARA, takedown, MFA),<\/p><\/li><li data-start=\"3408\" data-end=\"3500\"><p data-start=\"3411\" data-end=\"3500\"><strong data-start=\"3411\" data-end=\"3436\">Measurement &amp; improvement<\/strong> (MTTD\/MTTR, % alerts activated, lower re-exposures).<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6dccc3 e-flex e-con-boxed e-con e-parent\" data-id=\"d6dccc3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a31a0b elementor-widget elementor-widget-heading\" data-id=\"8a31a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Added value: SMEs, ETIs and local authorities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-264b592 e-flex e-con-boxed e-con e-parent\" data-id=\"264b592\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a4bd24 elementor-widget elementor-widget-text-editor\" data-id=\"3a4bd24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"3700\" data-end=\"3777\"><p data-start=\"3702\" data-end=\"3777\"><strong data-start=\"3702\" data-end=\"3716\">Visibility<\/strong> understanding the threats <strong data-start=\"3742\" data-end=\"3757\">specific<\/strong> to your context.<\/p><\/li><li data-start=\"3778\" data-end=\"3850\"><p data-start=\"3780\" data-end=\"3850\"><strong data-start=\"3780\" data-end=\"3798\">Early warning<\/strong> : to receive <strong data-start=\"3814\" data-end=\"3833\">filtered signals<\/strong> without SOC 24\/7.<\/p><\/li><li data-start=\"3851\" data-end=\"3954\"><p data-start=\"3853\" data-end=\"3954\"><strong data-start=\"3853\" data-end=\"3880\">Budget prioritization<\/strong> target actions <strong data-start=\"3902\" data-end=\"3924\">with greater impact<\/strong> (patches, EDRs, backups).<\/p><\/li><li data-start=\"3955\" data-end=\"4046\"><p data-start=\"3957\" data-end=\"4046\"><strong data-start=\"3957\" data-end=\"3983\">Compliance &amp; Insurance<\/strong> demonstrating a <strong data-start=\"4000\" data-end=\"4020\">organized monitoring<\/strong> (useful for NIS2\/insurers).<\/p><\/li><li data-start=\"4047\" data-end=\"4142\"><p data-start=\"4049\" data-end=\"4142\"><strong data-start=\"4049\" data-end=\"4069\">Safety culture<\/strong> examples <strong data-start=\"4085\" data-end=\"4097\">concrete<\/strong> that get things moving (MFA, processes).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3573104 e-flex e-con-boxed e-con e-parent\" data-id=\"3573104\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a323617 elementor-widget elementor-widget-heading\" data-id=\"a323617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e13e2f9 e-flex e-con-boxed e-con e-parent\" data-id=\"e13e2f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a963558 elementor-widget elementor-widget-text-editor\" data-id=\"a963558\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4183\" data-end=\"4350\"><strong data-start=\"4183\" data-end=\"4254\">Is cyber threat intelligence just for big business?<\/strong><br data-start=\"4254\" data-end=\"4257\" \/>No. We offer <strong data-start=\"4281\" data-end=\"4300\">tailored offers<\/strong> to SMEs, ETIs and local authorities (CTI-as-a-Service).<\/p><p data-start=\"4352\" data-end=\"4580\"><strong data-start=\"4352\" data-end=\"4392\">What's the difference between CTI and SOC?<\/strong><br data-start=\"4392\" data-end=\"4395\" \/>Visit <strong data-start=\"4398\" data-end=\"4405\">CTI<\/strong> brings the <strong data-start=\"4417\" data-end=\"4434\">information<\/strong> (who\/what\/how\/why), the <strong data-start=\"4467\" data-end=\"4474\">SOC<\/strong> operates the <strong data-start=\"4484\" data-end=\"4497\">detection<\/strong> and the<strong data-start=\"4503\" data-end=\"4520\">investigation<\/strong>. Together, they reduce noise and speed up response.<\/p><p data-start=\"4582\" data-end=\"4738\"><strong data-start=\"4582\" data-end=\"4611\">Can you start small?<\/strong><br data-start=\"4611\" data-end=\"4614\" \/>Yes. Start frugally (free feeds + targeted alerts), then ramp up (Flare, SIEM\/EDR integrations, playbooks).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-944181b e-flex e-con-boxed e-con e-parent\" data-id=\"944181b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1f9570 elementor-widget elementor-widget-heading\" data-id=\"f1f9570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our PhishiaCTI offer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ab997e e-flex e-con-boxed e-con e-parent\" data-id=\"1ab997e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-678e60c elementor-widget elementor-widget-text-editor\" data-id=\"678e60c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"203\" data-end=\"449\">Visit <strong data-start=\"206\" data-end=\"235\">cyber threat intelligence<\/strong> (CTI) is used to <strong data-start=\"249\" data-end=\"276\">see attacks coming<\/strong> and <strong data-start=\"282\" data-end=\"302\">react faster<\/strong>. The idea is not to add complicated tools, but to <strong data-start=\"362\" data-end=\"405\">receive the right information at the right time<\/strong> and <strong data-start=\"412\" data-end=\"448\">know what to do now<\/strong>.<\/p><h3 data-start=\"451\" data-end=\"484\">What Phishia does for you<\/h3><ul data-start=\"485\" data-end=\"1097\"><li data-start=\"485\" data-end=\"606\"><p data-start=\"487\" data-end=\"606\"><strong data-start=\"487\" data-end=\"517\">We watch over you<\/strong> what concerns you (login leaks, access for sale, brand scams).<\/p><\/li><li data-start=\"607\" data-end=\"700\"><p data-start=\"609\" data-end=\"700\"><strong data-start=\"609\" data-end=\"649\">We sort and explain<\/strong> what's important, without drowning you in alerts.<\/p><\/li><li data-start=\"701\" data-end=\"834\"><p data-start=\"703\" data-end=\"834\"><strong data-start=\"703\" data-end=\"743\">We tell you what to do right away<\/strong> (e.g. changing targeted passwords, blocking a fraudulent site, notifying a service).<\/p><\/li><li data-start=\"835\" data-end=\"962\"><p data-start=\"837\" data-end=\"962\"><strong data-start=\"837\" data-end=\"870\">We help you implement<\/strong> these actions in your current tools (e-mail, access, filtering), without any major technical project.<\/p><\/li><li data-start=\"963\" data-end=\"1097\"><p data-start=\"965\" data-end=\"1097\"><strong data-start=\"965\" data-end=\"995\">We prove efficiency<\/strong> with some simple figures: time to act, number of incidents avoided\/repeated, noise reduction.<\/p><\/li><\/ul><h3 data-start=\"1099\" data-end=\"1135\">What you actually get<\/h3><ul data-start=\"1136\" data-end=\"1379\"><li data-start=\"1136\" data-end=\"1214\"><p data-start=\"1138\" data-end=\"1214\"><strong data-start=\"1138\" data-end=\"1156\">Useful alerts<\/strong> and explained on one page (what, why, what to do).<\/p><\/li><li data-start=\"1215\" data-end=\"1289\"><p data-start=\"1217\" data-end=\"1289\"><strong data-start=\"1217\" data-end=\"1253\">Short, practical guidance<\/strong> if necessary (we'll do it with you).<\/p><\/li><li data-start=\"1290\" data-end=\"1379\"><p data-start=\"1292\" data-end=\"1379\"><strong data-start=\"1292\" data-end=\"1317\">Easy-to-read monthly report<\/strong> for management (what has been avoided, what remains to be done).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cb9978 e-flex e-con-boxed e-con e-parent\" data-id=\"4cb9978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]<\/p>","protected":false},"author":3,"featured_media":3161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/cyber-threat-intelligence-cti-simple-definition-concrete-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia\" \/>\n<meta property=\"og:description\" content=\"La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/cyber-threat-intelligence-cti-simple-definition-concrete-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T14:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"679\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.\",\"datePublished\":\"2025-10-28T14:53:34+00:00\",\"dateModified\":\"2025-11-25T14:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\",\"name\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"datePublished\":\"2025-10-28T14:53:34+00:00\",\"dateModified\":\"2025-11-25T14:00:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"width\":679,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence (CTI): simple definition, concrete examples. - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/cyber-threat-intelligence-cti-simple-definition-concrete-examples\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia","og_description":"La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/cyber-threat-intelligence-cti-simple-definition-concrete-examples\/","og_site_name":"Phishia","article_published_time":"2025-10-28T14:53:34+00:00","article_modified_time":"2025-11-25T14:00:54+00:00","og_image":[{"width":679,"height":680,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","type":"image\/jpeg"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.","datePublished":"2025-10-28T14:53:34+00:00","dateModified":"2025-11-25T14:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"},"wordCount":677,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/","name":"Cyber Threat Intelligence (CTI): simple definition, concrete examples. - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","datePublished":"2025-10-28T14:53:34+00:00","dateModified":"2025-11-25T14:00:54+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","width":679,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets."}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, Junior CyberSecurity Consultant"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3159"}],"version-history":[{"count":11,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3159\/revisions"}],"predecessor-version":[{"id":3905,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3159\/revisions\/3905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}