🤝 Join the Mission
Cyber Threat Intelligence (CTI) is a team sport. At Rectifyq, we believe that collective defense is the best defense—especially within our local Malaysian landscape.
Whether you are a seasoned CTI practitioner or a student just starting your journey, your analysis helps make the digital space safer for everyone.
🔍 How You Can Help
You don’t need a formal invitation to contribute. If you find something interesting using the data on the Rectifyq website or our MISP instance, we want to see your insights!
Areas of Focus
We are particularly interested in reports covering:
- 👤 Threat Actor Profiles: Deep dives into groups targeting Malaysian infrastructure or local industries.
- 🦠 Malware Analysis: Reverse engineering or behavioral analysis of samples found in the wild locally.
- 🚨 Incident Analysis: Post-mortem or technical breakdowns of recent Malaysian cyber incidents.
- 🔓 Leak Data Analysis: Investigating data breaches, credential dumps, or PII leaks affecting Malaysian citizens.
- 🎣 Phishing Analysis: Tracking local phishing kits, SMS scams (Smishing), or brand impersonation campaigns.
🛠 The Workflow
Contributing is straightforward:
- Analyze: Use the indicators (IoCs) and telemetry available on our website or MISP.
- Report: Create a technical write-up, a Gist, a PDF, or even a detailed social media thread.
- Notify: This is the most important part! Let us know you’ve published something so we can amplify your work.
TIP
Where to find us? Reach out to us via X (Twitter), LinkedIn, or any of our official social media channels. We’d love to feature your work or link it back to our intelligence feeds.
🎓 For Students
If you’re a student using Rectifyq data for your final year project or personal research, don’t be shy! Contributing a report is a fantastic way to build your portfolio and get noticed by the local cybersecurity community.