Threat Intelligence

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools 2025-04-09 at 20:50 By Ryan Naraine Google plans to unleash automated AI agents into overtaxed SOCs to reduce the manual workload for cybersecurity investigators. The post Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools appeared first on SecurityWeek. This […]

React to this headline:

Loading spinner

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools Read More »

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse 2025-04-08 at 16:29 By Serhii Melnyk and Nikita Kazymirskyi In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group. This article is an excerpt from SpiderLabs Blog View Original Source React to this

React to this headline:

Loading spinner

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse Read More »

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows 2025-04-07 at 18:06 By Ryan Naraine Experimental Sec-Gemini v1 touts a combination of Google’s Gemini LLM capabilities with real-time security data and tooling from Mandiant. The post Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows Read More »

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity 2025-03-28 at 15:09 By Uncover Critical Cybersecurity Gaps: Learn how Trustwave SpiderLabs’ Red Team identified vulnerabilities in a US-based healthcare system. Real-World Red Team Insights: Explore key findings from simulated attacks that reveal how adversaries could compromise sensitive data. Healthcare Cybersecurity Trends: Access exclusive

React to this headline:

Loading spinner

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity Read More »

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups 2025-03-27 at 15:08 By Top Targets: Discover which healthcare segments ransomware attackers target the most. Threat Actors Exposed: Learn about the cybercriminal groups behind the biggest healthcare attacks. Real-World Impact: See how ransomware disrupts patient care, emergency services, and medical research. Ransomware remains the primary threat the

React to this headline:

Loading spinner

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs 2025-03-25 at 13:54 By Kevin Townsend Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort. The post Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs appeared first on SecurityWeek.

React to this headline:

Loading spinner

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs Read More »

Unlock Critical Healthcare Cyber Insights — Pre-Register Now!

Unlock Critical Healthcare Cyber Insights — Pre-Register Now! 2025-03-19 at 22:22 By Trustwave is set to unveil the 2025 Trustwave Risk Radar Report: Healthcare Sector – A New Era of Cybersecurity Challenges. The report will be issued on March 26, but if you pre-register today you will be among the first to receive this comprehensive research and

React to this headline:

Loading spinner

Unlock Critical Healthcare Cyber Insights — Pre-Register Now! Read More »

March Madness Requires Vigilance on Both an Individual and Corporate Level

March Madness Requires Vigilance on Both an Individual and Corporate Level 2025-03-19 at 17:32 By Marc Solomon Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program. The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first on SecurityWeek. This

React to this headline:

Loading spinner

March Madness Requires Vigilance on Both an Individual and Corporate Level Read More »

New Cloudflare Service Provides Real-Time Threat Intelligence

New Cloudflare Service Provides Real-Time Threat Intelligence 2025-03-18 at 15:03 By Eduard Kovacs Cloudflare launches Cloudforce Threat Events Feed, a service designed to provide security teams with real-time threat intelligence. The post New Cloudflare Service Provides Real-Time Threat Intelligence appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

New Cloudflare Service Provides Real-Time Threat Intelligence Read More »

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ: Open-source tool for collecting and processing security feeds 2025-03-17 at 07:02 By Mirko Zorz IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security feeds using a message queuing protocol. “Originally designed for CSIRTs and later adopted by SOCs,

React to this headline:

Loading spinner

IntelMQ: Open-source tool for collecting and processing security feeds Read More »

Are Threat Groups Belsen and ZeroSevenGroup Related?

Are Threat Groups Belsen and ZeroSevenGroup Related? 2025-03-12 at 04:15 By Kevin Townsend Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Are Threat Groups Belsen and ZeroSevenGroup Related? Read More »

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing 2025-02-28 at 16:12 By When it comes to choosing a manufacturer to target for attack, threat groups have a healthy list of tools from which to choose. All of which are made more powerful due to this industry’s complex cybersecurity posture, driven by the increasing integration of IT/OT

React to this headline:

Loading spinner

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing Read More »

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing 2025-02-27 at 16:02 By The line between Information Technology (IT) and Operational Technology (OT) has been blurring for years and what once were two distinct realms — IT managing data and networks, and OT controlling physical processes on the production floor — are now

React to this headline:

Loading spinner

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing Read More »

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing 2025-02-26 at 16:06 By 2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: Discover the key cybersecurity challenges facing the manufacturing sector in 2025, including ransomware, phishing, and vulnerabilities in legacy systems and connected devices. Manufacturing Cybersecurity: IT/OT Convergence and Breach Methods Exposed: Explore two in-depth

React to this headline:

Loading spinner

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing Read More »

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector 2025-02-26 at 16:06 By 2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: Discover the key cybersecurity challenges facing the manufacturing sector in 2025, including ransomware, phishing, and vulnerabilities in legacy systems and connected devices. Manufacturing Cybersecurity: IT/OT Convergence and Breach Methods

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector Read More »

Man vs. machine: Striking the perfect balance in threat intelligence

Man vs. machine: Striking the perfect balance in threat intelligence 2025-02-24 at 08:00 By Mirko Zorz In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process massive data sets, the nuanced judgment of experienced analysts remains critical. Roberts

React to this headline:

Loading spinner

Man vs. machine: Striking the perfect balance in threat intelligence Read More »

Be the First to Receive the 2025 Trustwave Risk Radar Report: Manufacturing Sector

Be the First to Receive the 2025 Trustwave Risk Radar Report: Manufacturing Sector 2025-02-21 at 16:16 By Trustwave is set to unveil the 2025 Trustwave Risk Radar: Manufacturing Sector – a deep dive into the most pressing cybersecurity risks facing the industry – on February 26 as part of Trustwave SpiderLabs’ multi-year research into the

React to this headline:

Loading spinner

Be the First to Receive the 2025 Trustwave Risk Radar Report: Manufacturing Sector Read More »

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems 2025-02-14 at 20:18 By Associated Press The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems appeared first

React to this headline:

Loading spinner

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems Read More »

Scroll to Top