Threat Intelligence

Why every company needs a DDoS response plan

Why every company needs a DDoS response plan 2024-07-01 at 08:02 By Mirko Zorz In this Help Net Security interview, Richard Hummel, Senior Threat Intelligence Manager at NETSCOUT, discusses how companies can overcome the challenges of identifying and mitigating DDoS attacks. He stresses the need for adaptive, multilayered defense strategies and the inevitability of a […]

React to this headline:

Loading spinner

Why every company needs a DDoS response plan Read More »

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics 2024-06-05 at 15:03 By Kevin Townsend Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites. The post Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics appeared first on

React to this headline:

Loading spinner

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion Tactics Read More »

Cybersecurity teams gear up for tougher challenges in 2024

Cybersecurity teams gear up for tougher challenges in 2024 2024-05-28 at 07:01 By Help Net Security In this Help Net Security video, Tom Gorup, VP of Security Services at Edgio, discusses the continually changing threat landscape. It is riddled with vulnerabilities that are frequently exploited and only intensify as geopolitics and state-sponsored activity increase. Key

React to this headline:

Loading spinner

Cybersecurity teams gear up for tougher challenges in 2024 Read More »

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report 2024-05-23 at 14:31 By Kevin Townsend Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change. The post Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report appeared first

React to this headline:

Loading spinner

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report Read More »

SOCRadar Raises $25M Series B for Threat Intel Tech

SOCRadar Raises $25M Series B for Threat Intel Tech 2024-05-22 at 23:17 By SecurityWeek News Delaware startup secures a $25 million Series B funding round from PeakSpan Capital and Oxx. SOCRadar has raised to $30.2 million to date. The post SOCRadar Raises $25M Series B for Threat Intel Tech appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

SOCRadar Raises $25M Series B for Threat Intel Tech Read More »

The strategic advantages of targeted threat intelligence

The strategic advantages of targeted threat intelligence 2024-05-07 at 07:01 By Help Net Security In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every enterprise’s security stack. Threat intelligence plays a significant role in proactively managing a company’s threat exposure. High-quality

React to this headline:

Loading spinner

The strategic advantages of targeted threat intelligence Read More »

What is cybersecurity mesh architecture (CSMA)?

What is cybersecurity mesh architecture (CSMA)? 2024-05-03 at 07:01 By Help Net Security Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a common data schema and well-defined interfaces

React to this headline:

Loading spinner

What is cybersecurity mesh architecture (CSMA)? Read More »

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success 2024-04-23 at 17:16 By Kevin Townsend Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand. The post The

React to this headline:

Loading spinner

The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success Read More »

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns 2024-04-12 at 17:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement.  The post In Other News: Moscow Sewage Hack, Women in Cybersecurity

React to this headline:

Loading spinner

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns Read More »

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program 2024-04-11 at 16:31 By Marc Solomon With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks. The post Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

React to this headline:

Loading spinner

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program Read More »

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations Read More »

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance 2024-03-21 at 15:46 By Marc Solomon The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries. The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance Read More »

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

SecurityWeek Cyber Insights 2024 Series

SecurityWeek Cyber Insights 2024 Series 2024-03-11 at 16:01 By Kevin Townsend Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics. The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

SecurityWeek Cyber Insights 2024 Series Read More »

State-sponsored hackers know enterprise VPN appliances inside out

State-sponsored hackers know enterprise VPN appliances inside out 2024-02-28 at 14:19 By Zeljka Zorz Suspected Chinese state-sponsored hackers who have been leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hunters. They were able to perform a

React to this headline:

Loading spinner

State-sponsored hackers know enterprise VPN appliances inside out Read More »

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements 2024-02-26 at 18:04 By Marc Solomon Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands. The post

React to this headline:

Loading spinner

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements Read More »

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force 2024-02-21 at 07:31 By Kevin Townsend The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are growing. The post Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

React to this headline:

Loading spinner

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force Read More »

The Ransomware Threat in 2024 is Growing: Report

The Ransomware Threat in 2024 is Growing: Report 2024-01-30 at 19:02 By Kevin Townsend Anyone who believes ransomware will go away doesn’t understand the nature of criminality. Extortion has and always will be a primary criminal business plan. The post The Ransomware Threat in 2024 is Growing: Report appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

The Ransomware Threat in 2024 is Growing: Report Read More »

Scroll to Top