Threat Intelligence

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden […]

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution Read More »

Cash-Strapped IronNet Faces Bankruptcy Options

Cash-Strapped IronNet Faces Bankruptcy Options 06/09/2023 at 22:46 By Ryan Naraine It appears to be the end of the road for IronNet, the once-promising network security play founded by former NSA director General Keith Alexander. The post Cash-Strapped IronNet Faces Bankruptcy Options appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Cash-Strapped IronNet Faces Bankruptcy Options Read More »

What makes a good ASM solution stand out

What makes a good ASM solution stand out 29/08/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations should redefine their attack surface concept and discusses proactive measures they can take to strengthen their

React to this headline:

Loading spinner

What makes a good ASM solution stand out Read More »

Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint

Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint 24/08/2023 at 23:34 By Ryan Naraine Microsoft warns that Chinese spies are hacking into Taiwanese organizations with minimal use of malware and by abusing legitimate software. The post Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Chinese-backed APT ‘Flax Typhoon’ Hacks Taiwan with Minimal Malware Footprint Read More »

Threat intelligence’s key role in mitigating malware threats

Threat intelligence’s key role in mitigating malware threats 11/08/2023 at 07:02 By Help Net Security Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and

React to this headline:

Loading spinner

Threat intelligence’s key role in mitigating malware threats Read More »

Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context

Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context 08/08/2023 at 18:19 By Matt Wilson Context helps complete the picture and results in actionable intelligence that security teams can use to make informed decisions more quickly. The post Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context

React to this headline:

Loading spinner

Protection is No Longer Straightforward – Why More Cybersecurity Solutions Must Incorporate Context Read More »

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform 02/08/2023 at 18:03 By Ionut Arghire Threat intelligence firm Cyble has raised $24 million in a Series B funding round co-led by Blackbird Ventures and King River Capital. The post Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform Read More »

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding 27/07/2023 at 19:16 By Ionut Arghire Threat intelligence services provider QuoIntelligence has raised €5 million ($5.5 million) in seed funding. The post European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding Read More »

Cybersecurity Public-Private Partnership: Where Do We Go Next?

Cybersecurity Public-Private Partnership: Where Do We Go Next? 24/07/2023 at 17:02 By Derek Manky Sharing threat information and cooperating with other threat intelligence groups helps to strengthen customer safeguards and boosts the effectiveness of the cybersecurity sector overall. The post Cybersecurity Public-Private Partnership: Where Do We Go Next? appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cybersecurity Public-Private Partnership: Where Do We Go Next? Read More »

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer 21/07/2023 at 19:19 By cybleinc Cyble Research and Intelligence Labs analyzes Threat Actors spreading Luca Stealer disguised as a beta version of Microsoft Crypto Wallet. The post Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer appeared first on Cyble. This article is an excerpt from Cyble View

React to this headline:

Loading spinner

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer Read More »

Is your browser betraying you? Emerging threats in 2023

Is your browser betraying you? Emerging threats in 2023 07/07/2023 at 07:02 By Help Net Security Network attacks (IPS detections) have remained relatively flat over the last three quarters, technically down a bit more than 3%, according to WatchGuard. “Organisations need to pay more active, ongoing attention to the existing security solutions and strategies their

React to this headline:

Loading spinner

Is your browser betraying you? Emerging threats in 2023 Read More »

How to cultivate a culture of continuous cybersecurity improvement

How to cultivate a culture of continuous cybersecurity improvement 06/07/2023 at 07:32 By Help Net Security Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does not create an impenetrable fortress against threats, it merely creates a baseline defense. So, how

React to this headline:

Loading spinner

How to cultivate a culture of continuous cybersecurity improvement Read More »

Multiple New Clipper Malware Variants Discovered in the Wild

Multiple New Clipper Malware Variants Discovered in the Wild 30/06/2023 at 17:04 By cybleinc Cyble analyzes various new Clipper malware variants specifically targeting Cryptocurrency users in the wild. The post Multiple New Clipper Malware Variants Discovered in the Wild appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to

React to this headline:

Loading spinner

Multiple New Clipper Malware Variants Discovered in the Wild Read More »

Cyware Snags $30M for Threat Intel Infrastructure Tech

Cyware Snags $30M for Threat Intel Infrastructure Tech 29/06/2023 at 20:38 By Ryan Naraine New York startup $30 million in new financing to fuel plans to take advantage of the demand for AI-powered threat-intel security tools. The post Cyware Snags $30M for Threat Intel Infrastructure Tech appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cyware Snags $30M for Threat Intel Infrastructure Tech Read More »

Unveiling Wagner Group’s Cyber-Recruitment

Unveiling Wagner Group’s Cyber-Recruitment 27/06/2023 at 15:18 By cybleinc Cyble analyzes Wagner Ransomware, a ransomware variant promoting recruitment into PMC Wagner amidst ongoing Russian internal conflict. The post Unveiling Wagner Group’s Cyber-Recruitment appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Unveiling Wagner Group’s Cyber-Recruitment Read More »

Trojanized Super Mario Game Installer Spreads SupremeBot Malware

Trojanized Super Mario Game Installer Spreads SupremeBot Malware 23/06/2023 at 15:24 By cybleinc Cyble analyzes SupremeBot, a crypto-mining client leveraging a trojanized Super Mario game installer to spread Umbral stealer malware. The post Trojanized Super Mario Game Installer Spreads SupremeBot Malware appeared first on Cyble. This article is an excerpt from Cyble View Original Source

React to this headline:

Loading spinner

Trojanized Super Mario Game Installer Spreads SupremeBot Malware Read More »

The Benefits of Red Zone Threat Intelligence

The Benefits of Red Zone Threat Intelligence 22/06/2023 at 16:31 By Derek Manky Incorporating Red Zone threat intelligence into your security strategy will help you stay on top of the latest threats and better protect your organization. The post The Benefits of Red Zone Threat Intelligence appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

The Benefits of Red Zone Threat Intelligence Read More »

Compromised ChatGPT accounts garner rapid dark web popularity

Compromised ChatGPT accounts garner rapid dark web popularity 21/06/2023 at 09:06 By Help Net Security Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing compromised ChatGPT accounts reached a peak of 26,802 in May 2023.

React to this headline:

Loading spinner

Compromised ChatGPT accounts garner rapid dark web popularity Read More »

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations 20/06/2023 at 16:11 By cybleinc Cyble investigates the Current vulnerability Threat landscape and observes distribution of Proof Of Concepts over Darkweb. The post Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations appeared first on Cyble. This article is an

React to this headline:

Loading spinner

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations Read More »

Malicious Tools in the Underground: Investigating their Propagation

Malicious Tools in the Underground: Investigating their Propagation 16/06/2023 at 19:04 By cybleinc Cyble Research & Intelligence Labs investigates the recent promulgation of Malicious Tools in underground forums. The post Malicious Tools in the Underground: Investigating their Propagation appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this

React to this headline:

Loading spinner

Malicious Tools in the Underground: Investigating their Propagation Read More »

Scroll to Top