Threat Intelligence

Silent Push Raises $10 Million for Threat Intelligence Platform

Silent Push Raises $10 Million for Threat Intelligence Platform 2025-09-15 at 17:53 By Eduard Kovacs Silent Push, which provides Indicators of Future Attack, has raised a total of $32 million in funding. The post Silent Push Raises $10 Million for Threat Intelligence Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

Silent Push Raises $10 Million for Threat Intelligence Platform Read More »

Static feeds leave intelligence teams reacting to irrelevant or late data

Static feeds leave intelligence teams reacting to irrelevant or late data 2025-09-15 at 07:12 By Anamarija Pogorelec Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues

React to this headline:

Loading spinner

Static feeds leave intelligence teams reacting to irrelevant or late data Read More »

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Ransomware Losses Climb as AI Pushes Phishing to New Heights 2025-09-09 at 16:39 By Kevin Townsend Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI. The post Ransomware Losses Climb as AI Pushes Phishing to

React to this headline:

Loading spinner

Ransomware Losses Climb as AI Pushes Phishing to New Heights Read More »

Cutting through CVE noise with real-world threat signals

Cutting through CVE noise with real-world threat signals 2025-09-04 at 09:02 By Sinisa Markovic CISOs are dealing with an overload of vulnerability data. Each year brings tens of thousands of new CVEs, yet only a small fraction ever become weaponized. Teams often fall back on CVSS scores, which label thousands of flaws as “high” or

React to this headline:

Loading spinner

Cutting through CVE noise with real-world threat signals Read More »

Detecting danger: EASM in the modern security stack

Detecting danger: EASM in the modern security stack 2025-09-03 at 08:03 By Help Net Security In today’s complex threat environment, the challenge for security professionals isn’t just defeating threats – it’s finding your vulnerabilities in the first place. That’s where External Attack Surface Management (EASM) tools come in. EASM can identify the many weaknesses that

React to this headline:

Loading spinner

Detecting danger: EASM in the modern security stack Read More »

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years 2025-08-28 at 17:21 By Ionut Arghire China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.

React to this headline:

Loading spinner

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years Read More »

Can AI make threat intelligence easier? One platform thinks so

Can AI make threat intelligence easier? One platform thinks so 2025-08-28 at 07:38 By Mirko Zorz When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking blogs, RSS feeds, and social media channels, but it took too long to separate

React to this headline:

Loading spinner

Can AI make threat intelligence easier? One platform thinks so Read More »

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox 2025-08-28 at 00:09 By Nigel Hardy Transform threat intelligence into actionable insights with contextualized data that aligns with your organization’s unique cybersecurity challenges. Strengthen your cybersecurity posture by mapping your attack surface, prioritizing threats, and focusing on what matters most to your business. Partner

React to this headline:

Loading spinner

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox Read More »

AI is becoming a core tool in cybercrime, Anthropic warns

AI is becoming a core tool in cybercrime, Anthropic warns 2025-08-27 at 17:32 By Anamarija Pogorelec A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and

React to this headline:

Loading spinner

AI is becoming a core tool in cybercrime, Anthropic warns Read More »

Using lightweight LLMs to cut incident response times and reduce hallucinations

Using lightweight LLMs to cut incident response times and reduce hallucinations 2025-08-21 at 09:03 By Mirko Zorz Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing the risk of hallucinations. Their approach uses a smaller, fine-tuned LLM

React to this headline:

Loading spinner

Using lightweight LLMs to cut incident response times and reduce hallucinations Read More »

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available 2025-07-20 at 17:16 By Mike Lennon Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately. The post SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the

React to this headline:

Loading spinner

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available Read More »

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding 2025-07-16 at 15:49 By Eduard Kovacs iCOUNTER, which helps organizations defend against targeted attacks, has launched under the helm of former Mandiant president and COO John Watters. The post Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding appeared first

React to this headline:

Loading spinner

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding Read More »

6 Proactive Steps for Tech Companies to Stay Protected in 2025

6 Proactive Steps for Tech Companies to Stay Protected in 2025 2025-07-09 at 16:05 By The Trustwave’s SpiderLabs’ 2025 Risk Radar Report: Technology Sector highlights a persistent and evolving threat landscape, emphasizing that while the tech industry leads in digital offerings, it often lags in information security. This article is an excerpt from Trustwave Blog View Original

React to this headline:

Loading spinner

6 Proactive Steps for Tech Companies to Stay Protected in 2025 Read More »

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 2025-07-02 at 16:01 By The 2025 Trustwave Technology Risk Radar Report highlights ransomware as a major and persistent threat within the technology sector that shows no signs of abating as new ransomware-focused threat groups are constantly appearing. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 Read More »

Federal Reserve System CISO on aligning cyber risk management with transparency, trust

Federal Reserve System CISO on aligning cyber risk management with transparency, trust 2025-07-01 at 09:08 By Mirko Zorz In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to financial stability and

React to this headline:

Loading spinner

Federal Reserve System CISO on aligning cyber risk management with transparency, trust Read More »

How cybercriminals are weaponizing AI and what CISOs should do about it

How cybercriminals are weaponizing AI and what CISOs should do about it 2025-07-01 at 08:31 By Mirko Zorz In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone. Everyone on the call except the employee

React to this headline:

Loading spinner

How cybercriminals are weaponizing AI and what CISOs should do about it Read More »

Tracing Blind Eagle to Proton66

Tracing Blind Eagle to Proton66 2025-06-27 at 16:19 By Serhii Melnyk Trustwave SpiderLabs has assessed with high confidence that the threat group Blind Eagle, aka APT-C-36, is associated with the Russian bulletproof hosting service provider Proton66. Blind Eagle is a threat actor actively targeting organizations across Latin America, with a notable focus on Colombian financial institutions.

React to this headline:

Loading spinner

Tracing Blind Eagle to Proton66 Read More »

Trustwave SpiderLabs Investigates the Dark Web’s Role in Supply Chain Attacks

Trustwave SpiderLabs Investigates the Dark Web’s Role in Supply Chain Attacks 2025-06-27 at 16:04 By One of the most dangerous aspects of the dark web is that it provides like-minded threat actors a haven to gather, discuss, develop, and sell access to technology companies, which are often the first link in a supply chain attack.

React to this headline:

Loading spinner

Trustwave SpiderLabs Investigates the Dark Web’s Role in Supply Chain Attacks Read More »

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race 2025-06-26 at 16:01 By While all manner of legitimate organizations are attempting to understand how to best and safely use artificial intelligence to improve productivity, the Trustwave SpiderLabs’ Technology Deep Dive: AI Cyber Arms Race takes a forward-looking view at how adversaries are gaining experience and capability in

React to this headline:

Loading spinner

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race Read More »

Tech Under Siege: Unpacking Cyber Threats in Trustwave’s 2025 Risk Report

Tech Under Siege: Unpacking Cyber Threats in Trustwave’s 2025 Risk Report 2025-06-25 at 16:40 By Dive into Trustwave SpiderLabs’ newest report for crucial insights on protecting tech companies from today’s changing cyber threats. Uncover the impact of ransomware attacks on tech firms and identify the most active threat actors of 2025. Learn about the best

React to this headline:

Loading spinner

Tech Under Siege: Unpacking Cyber Threats in Trustwave’s 2025 Risk Report Read More »

Scroll to Top