Threat Intelligence

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program 2024-04-11 at 16:31 By Marc Solomon With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks. The post Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program […]

React to this headline:

Loading spinner

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program Read More »

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations Read More »

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance 2024-03-21 at 15:46 By Marc Solomon The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries. The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance Read More »

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

SecurityWeek Cyber Insights 2024 Series

SecurityWeek Cyber Insights 2024 Series 2024-03-11 at 16:01 By Kevin Townsend Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics. The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

SecurityWeek Cyber Insights 2024 Series Read More »

State-sponsored hackers know enterprise VPN appliances inside out

State-sponsored hackers know enterprise VPN appliances inside out 2024-02-28 at 14:19 By Zeljka Zorz Suspected Chinese state-sponsored hackers who have been leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hunters. They were able to perform a

React to this headline:

Loading spinner

State-sponsored hackers know enterprise VPN appliances inside out Read More »

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements 2024-02-26 at 18:04 By Marc Solomon Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands. The post

React to this headline:

Loading spinner

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements Read More »

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force 2024-02-21 at 07:31 By Kevin Townsend The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are growing. The post Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

React to this headline:

Loading spinner

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force Read More »

The Ransomware Threat in 2024 is Growing: Report

The Ransomware Threat in 2024 is Growing: Report 2024-01-30 at 19:02 By Kevin Townsend Anyone who believes ransomware will go away doesn’t understand the nature of criminality. Extortion has and always will be a primary criminal business plan. The post The Ransomware Threat in 2024 is Growing: Report appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

The Ransomware Threat in 2024 is Growing: Report Read More »

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity 2024-01-29 at 07:32 By Mirko Zorz In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice

React to this headline:

Loading spinner

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity Read More »

Doppel Secures $14M for AI-Powered Brand Protection Technology

Doppel Secures $14M for AI-Powered Brand Protection Technology 2024-01-23 at 15:46 By Ryan Naraine San Francisco startup banks $14 million in Series A funding led by prominent venture capital outfit Andreesen Horowitz (a16z). The post Doppel Secures $14M for AI-Powered Brand Protection Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Doppel Secures $14M for AI-Powered Brand Protection Technology Read More »

Sneaky Azorult Back in Action and Goes Undetected

Sneaky Azorult Back in Action and Goes Undetected 2024-01-12 at 17:31 By dakshsharma16 Key Takeaways Overview First identified in 2016, Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details. Additionally, it can function as a downloader for other malware families. This malicious software was offered

React to this headline:

Loading spinner

Sneaky Azorult Back in Action and Goes Undetected Read More »

Embracing offensive cybersecurity tactics for defense against dynamic threats

Embracing offensive cybersecurity tactics for defense against dynamic threats 2024-01-11 at 07:02 By Mirko Zorz In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. What are the critical steps in creating effective offensive security

React to this headline:

Loading spinner

Embracing offensive cybersecurity tactics for defense against dynamic threats Read More »

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation 08/12/2023 at 00:48 By Ryan Naraine The US cybersecurity agency calls attention to a Russian APT targeting academia, defense, governmental organizations, NGOs and think-tanks. The post CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation Read More »

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report 04/12/2023 at 18:16 By Ionut Arghire Recorded Future calculates that North Korean state-sponsored threat actors are believed to have stolen more than $3 billion in cryptocurrency. The post North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report appeared first on SecurityWeek. This

React to this headline:

Loading spinner

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report Read More »

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 30/11/2023 at 19:32 By cybleinc CGSI captures the active exploitation of ownCloud’s critical vulnerability CVE-2023-49103. The post CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 Read More »

Meta Takes Action Against Multiple Foreign Influence Campaigns

Meta Takes Action Against Multiple Foreign Influence Campaigns 30/11/2023 at 17:46 By Kevin Townsend Meta removed three foreign influence operations from the Facebook platform during Q3, 2023. Two were Chinese in origin, and one was Russian, the company says.  The post Meta Takes Action Against Multiple Foreign Influence Campaigns appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Meta Takes Action Against Multiple Foreign Influence Campaigns Read More »

Enterprises prepare for the inevitable cyber attack

Enterprises prepare for the inevitable cyber attack 29/11/2023 at 07:31 By Help Net Security Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives. In fact, 52% of senior leaders have no involvement in their company’s cyber cases. In this Help Net Security video, Rahul

React to this headline:

Loading spinner

Enterprises prepare for the inevitable cyber attack Read More »

Scroll to Top