Threat Intelligence

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication 2024-08-07 at 16:01 By Kevin Townsend The ransomware scourge is still growing and still successful for attackers, Rapid7’s Ransomware Radar Report 2024 shows. The post Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication appeared first on SecurityWeek. This article is an excerpt from […]

React to this headline:

Loading spinner

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication Read More »

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains 2024-08-06 at 00:01 By Ryan Naraine AWS says a massive neural network graph model with 3.5 billion nodes and 48 billion edges is speeding up the prediction and detection of malicious domains. The post AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious

React to this headline:

Loading spinner

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains Read More »

MISP: Open-source threat intelligence and sharing platform

MISP: Open-source threat intelligence and sharing platform 2024-08-05 at 07:01 By Help Net Security MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professionals, and malware reversers to support their daily

React to this headline:

Loading spinner

MISP: Open-source threat intelligence and sharing platform Read More »

Threat intelligence: A blessing and a curse?

Threat intelligence: A blessing and a curse? 2024-08-01 at 07:31 By Help Net Security Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the right information from

React to this headline:

Loading spinner

Threat intelligence: A blessing and a curse? Read More »

Using Threat Intelligence to Predict Potential Ransomware Attacks

Using Threat Intelligence to Predict Potential Ransomware Attacks 2024-07-18 at 23:02 By Marc Solomon The risk of suffering a ransomware attack is high and organizations must take proactive steps to protect themselves and minimize the impact of a potential breach. The post Using Threat Intelligence to Predict Potential Ransomware Attacks appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Using Threat Intelligence to Predict Potential Ransomware Attacks Read More »

How AI helps decode cybercriminal strategies

How AI helps decode cybercriminal strategies 2024-07-11 at 07:32 By Help Net Security With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible business benefits is in full swing,

React to this headline:

Loading spinner

How AI helps decode cybercriminal strategies Read More »

How nation-state cyber attacks disrupt public services and undermine citizen trust

How nation-state cyber attacks disrupt public services and undermine citizen trust 2024-07-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the impact of nation-state cyber attacks on public sector services and citizens, as well as the broader implications for

React to this headline:

Loading spinner

How nation-state cyber attacks disrupt public services and undermine citizen trust Read More »

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track 2024-07-05 at 15:02 By Marc Solomon The Olympic Games is only 29 days long, so set up and take down is a very intense period, where the threat actors can take advantage. The post How Intelligence Sharing Can Help Keep Major Worldwide Sporting

React to this headline:

Loading spinner

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track Read More »

Why every company needs a DDoS response plan

Why every company needs a DDoS response plan 2024-07-01 at 08:02 By Mirko Zorz In this Help Net Security interview, Richard Hummel, Senior Threat Intelligence Manager at NETSCOUT, discusses how companies can overcome the challenges of identifying and mitigating DDoS attacks. He stresses the need for adaptive, multilayered defense strategies and the inevitability of a

React to this headline:

Loading spinner

Why every company needs a DDoS response plan Read More »

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics 2024-06-05 at 15:03 By Kevin Townsend Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites. The post Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics appeared first on

React to this headline:

Loading spinner

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics Read More »

Cybersecurity teams gear up for tougher challenges in 2024

Cybersecurity teams gear up for tougher challenges in 2024 2024-05-28 at 07:01 By Help Net Security In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored activity increase. Key

React to this headline:

Loading spinner

Cybersecurity teams gear up for tougher challenges in 2024 Read More »

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report 2024-05-23 at 14:31 By Kevin Townsend Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change. The post Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report appeared first

React to this headline:

Loading spinner

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report Read More »

SOCRadar Raises $25M Series B for Threat Intel Tech

SOCRadar Raises $25M Series B for Threat Intel Tech 2024-05-22 at 23:17 By SecurityWeek News Delaware startup secures a $25 million Series B funding round from PeakSpan Capital and Oxx. SOCRadar has raised to $30.2 million to date. The post SOCRadar Raises $25M Series B for Threat Intel Tech appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

SOCRadar Raises $25M Series B for Threat Intel Tech Read More »

The strategic advantages of targeted threat intelligence

The strategic advantages of targeted threat intelligence 2024-05-07 at 07:01 By Help Net Security In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every enterprise’s security stack. Threat intelligence plays a significant role in proactively managing a company’s threat exposure. High-quality

React to this headline:

Loading spinner

The strategic advantages of targeted threat intelligence Read More »

What is cybersecurity mesh architecture (CSMA)?

What is cybersecurity mesh architecture (CSMA)? 2024-05-03 at 07:01 By Help Net Security Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a common data schema and well-defined interfaces

React to this headline:

Loading spinner

What is cybersecurity mesh architecture (CSMA)? Read More »

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success 2024-04-23 at 17:16 By Kevin Townsend Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand. The post The

React to this headline:

Loading spinner

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success Read More »

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns 2024-04-12 at 17:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement.  The post In Other News: Moscow Sewage Hack, Women in Cybersecurity

React to this headline:

Loading spinner

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns Read More »

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program 2024-04-11 at 16:31 By Marc Solomon With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks. The post Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

React to this headline:

Loading spinner

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program Read More »

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations Read More »

Scroll to Top