… and supporting documentation for securely exchanging cyber threat information in order to detect, prevent, and mitigate cyber threats in real time. Today, an ever-growing number of … worms have given way to skillful, persistent adversaries seeking specific information, such as online banking credentials, intellectual property, or national security information. Other … Threats: A Decade in Review,” Command Five Pty Ltd, June 2011. URL http://www.commandfive.com/papers/C5_APT_ADecadeInReview.pdf [3] E.M. Hutchins, M.J. Cloppert and R.M Amin PH.D., …