<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Diksha Sharma</title>
    <description>The latest articles on DEV Community by Diksha Sharma (@diksha_sharma15).</description>
    <link>https://dev.to/diksha_sharma15</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3873738%2F753e5f42-7082-4ef3-baa8-b6eca2289fdd.png</url>
      <title>DEV Community: Diksha Sharma</title>
      <link>https://dev.to/diksha_sharma15</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/diksha_sharma15"/>
    <language>en</language>
    <item>
      <title>🚨 Understanding Threat Intelligence: From Raw Data to Meaningful Insights</title>
      <dc:creator>Diksha Sharma</dc:creator>
      <pubDate>Sat, 11 Apr 2026 16:29:40 +0000</pubDate>
      <link>https://dev.to/diksha_sharma15/understanding-threat-intelligence-from-raw-data-to-meaningful-insights-3b0n</link>
      <guid>https://dev.to/diksha_sharma15/understanding-threat-intelligence-from-raw-data-to-meaningful-insights-3b0n</guid>
      <description>&lt;p&gt;Recently, I tried to understand how cybersecurity teams actually figure out if something is truly dangerous on the internet — and not just rely on one source of information.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;To explore this, I built a small system where I collected suspicious data (like IP addresses, urls,domains,etc.) from multiple platforms such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VirusTotal&lt;/li&gt;
&lt;li&gt;AbuseIPDB&lt;/li&gt;
&lt;li&gt;AlienVault OTX&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each of these platforms provides its own perspective on whether something is harmful or not.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Reality of Data: It’s Messy
&lt;/h2&gt;

&lt;p&gt;At first, it seemed simple — just collect the data.&lt;/p&gt;

&lt;p&gt;But very quickly, I realized that the data comes in different formats and is quite messy:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Different structures&lt;/li&gt;
&lt;li&gt;Nested JSON responses&lt;/li&gt;
&lt;li&gt;Inconsistent field names&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To handle this, I used a &lt;strong&gt;Python script&lt;/strong&gt; to parse and clean the data:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Extracted relevant fields&lt;/li&gt;
&lt;li&gt;Standardized the structure&lt;/li&gt;
&lt;li&gt;Made the data usable for further analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxguctunmbdft4p1wi7o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxguctunmbdft4p1wi7o.png" alt=" " width="800" height="456"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvsrmzezje7a51lryl9b1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvsrmzezje7a51lryl9b1.png" alt=" " width="800" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This step turned out to be one of the most important parts of the entire process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5x726f86wqjd1y7gtz9u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5x726f86wqjd1y7gtz9u.png" alt=" " width="800" height="639"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  From Data to Insights
&lt;/h2&gt;

&lt;p&gt;Once everything was structured, I stored it in a system (similar to what security teams use) and created dashboards to analyze it.&lt;/p&gt;

&lt;p&gt;This helped me:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compare what different platforms were saying about the same suspicious item&lt;/li&gt;
&lt;li&gt;Identify patterns across multiple sources&lt;/li&gt;
&lt;li&gt;Understand which indicators were more likely to be malicious&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmciratdeedwzh2am7195.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmciratdeedwzh2am7195.png" alt=" " width="800" height="427"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyqzcc90g8wagiylh5hy5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyqzcc90g8wagiylh5hy5.png" alt=" " width="800" height="249"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Insight
&lt;/h2&gt;

&lt;p&gt;One source saying something is suspicious doesn’t mean much.&lt;/p&gt;

&lt;p&gt;But when multiple trusted sources say the same thing, it becomes much more reliable.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Changed for Me
&lt;/h2&gt;

&lt;p&gt;This experience really changed how I think:&lt;/p&gt;

&lt;p&gt;From:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Just collecting data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Understanding patterns&lt;/li&gt;
&lt;li&gt;Connecting multiple data points&lt;/li&gt;
&lt;li&gt;Making better, informed decisions&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  My Thoughts
&lt;/h2&gt;

&lt;p&gt;Cybersecurity is not just about tools — it’s about how you interpret and connect data.&lt;/p&gt;

&lt;p&gt;This small practice helped me understand how raw information can be transformed into meaningful insights, which is exactly how modern SOC teams operate.&lt;/p&gt;




&lt;p&gt;💬 If you’re exploring cybersecurity, I’d love to hear your thoughts or approaches!&lt;/p&gt;

</description>
      <category>security</category>
      <category>socengineering</category>
      <category>cybersecurity</category>
      <category>threatintelligence</category>
    </item>
  </channel>
</rss>
