Threat Intelligence

Threat intelligence: A blessing and a curse?

Threat intelligence: A blessing and a curse? 2024-08-01 at 07:31 By Help Net Security Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the right information from […]

React to this headline:

Loading spinner

Threat intelligence: A blessing and a curse? Read More »

Using Threat Intelligence to Predict Potential Ransomware Attacks

Using Threat Intelligence to Predict Potential Ransomware Attacks 2024-07-18 at 23:02 By Marc Solomon The risk of suffering a ransomware attack is high and organizations must take proactive steps to protect themselves and minimize the impact of a potential breach. The post Using Threat Intelligence to Predict Potential Ransomware Attacks appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Using Threat Intelligence to Predict Potential Ransomware Attacks Read More »

How AI helps decode cybercriminal strategies

How AI helps decode cybercriminal strategies 2024-07-11 at 07:32 By Help Net Security With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible business benefits is in full swing,

React to this headline:

Loading spinner

How AI helps decode cybercriminal strategies Read More »

How nation-state cyber attacks disrupt public services and undermine citizen trust

How nation-state cyber attacks disrupt public services and undermine citizen trust 2024-07-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the impact of nation-state cyber attacks on public sector services and citizens, as well as the broader implications for

React to this headline:

Loading spinner

How nation-state cyber attacks disrupt public services and undermine citizen trust Read More »

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track 2024-07-05 at 15:02 By Marc Solomon The Olympic Games is only 29 days long, so set up and take down is a very intense period, where the threat actors can take advantage. The post How Intelligence Sharing Can Help Keep Major Worldwide Sporting

React to this headline:

Loading spinner

How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track Read More »

Why every company needs a DDoS response plan

Why every company needs a DDoS response plan 2024-07-01 at 08:02 By Mirko Zorz In this Help Net Security interview, Richard Hummel, Senior Threat Intelligence Manager at NETSCOUT, discusses how companies can overcome the challenges of identifying and mitigating DDoS attacks. He stresses the need for adaptive, multilayered defense strategies and the inevitability of a

React to this headline:

Loading spinner

Why every company needs a DDoS response plan Read More »

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics 2024-06-05 at 15:03 By Kevin Townsend Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites. The post Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics appeared first on

React to this headline:

Loading spinner

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics Read More »

Cybersecurity teams gear up for tougher challenges in 2024

Cybersecurity teams gear up for tougher challenges in 2024 2024-05-28 at 07:01 By Help Net Security In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored activity increase. Key

React to this headline:

Loading spinner

Cybersecurity teams gear up for tougher challenges in 2024 Read More »

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report 2024-05-23 at 14:31 By Kevin Townsend Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change. The post Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report appeared first

React to this headline:

Loading spinner

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report Read More »

SOCRadar Raises $25M Series B for Threat Intel Tech

SOCRadar Raises $25M Series B for Threat Intel Tech 2024-05-22 at 23:17 By SecurityWeek News Delaware startup secures a $25 million Series B funding round from PeakSpan Capital and Oxx. SOCRadar has raised to $30.2 million to date. The post SOCRadar Raises $25M Series B for Threat Intel Tech appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

SOCRadar Raises $25M Series B for Threat Intel Tech Read More »

The strategic advantages of targeted threat intelligence

The strategic advantages of targeted threat intelligence 2024-05-07 at 07:01 By Help Net Security In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every enterprise’s security stack. Threat intelligence plays a significant role in proactively managing a company’s threat exposure. High-quality

React to this headline:

Loading spinner

The strategic advantages of targeted threat intelligence Read More »

What is cybersecurity mesh architecture (CSMA)?

What is cybersecurity mesh architecture (CSMA)? 2024-05-03 at 07:01 By Help Net Security Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a common data schema and well-defined interfaces

React to this headline:

Loading spinner

What is cybersecurity mesh architecture (CSMA)? Read More »

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success 2024-04-23 at 17:16 By Kevin Townsend Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand. The post The

React to this headline:

Loading spinner

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success Read More »

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns 2024-04-12 at 17:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement.  The post In Other News: Moscow Sewage Hack, Women in Cybersecurity

React to this headline:

Loading spinner

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns Read More »

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program 2024-04-11 at 16:31 By Marc Solomon With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks. The post Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

React to this headline:

Loading spinner

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program Read More »

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations Read More »

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance 2024-03-21 at 15:46 By Marc Solomon The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries. The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance Read More »

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

Scroll to Top