Security News

Group-IB has revealed the results of its yearslong development of proprietary high-tech products for threat hunting and research - Threat Intelligence & Attribution and Threat Hunting Framework. The creation of TI&A marks the emergence of a new type of solutions for collecting data on threats and attackers relevant for a particular organization with the aim of examination and proactive hunting for threat actors, research, and protection of network infrastructure.

Cyber Risk Aware announces a new partnership with one of the UK's largest cyber security solutions providers, Blue Cube Security. Cyber Risk Aware and Blue Cube Security have joined forces on a mission to tackle the increasing cyber threat to businesses and organisations in the UK. Over the last year, 98% of security professionals in the UK have reported an increase in cyber-attacks, with 96% revealing more sophisticated methods being used in these attacks.

A Chinese threat actor tracked as Mustang Panda was observed using an updated arsenal of tools in recent attacks, Proofpoint's security researchers revealed on Monday. Also referred to as TA416 and RedDelta, the threat group is known for the targeting of entities connected to the diplomatic relations between the Vatican and the Chinese Communist Party, along with entities in Myanmar, and the new campaign appears to be a continuation of that activity.

Did you know you can join us for a live cybersecurity lecture every Friday? Thanks for watching hope to see you online later this week!

Whether working within a company that has deployed an advanced intelligence program or in one just getting started, there are steps we can take to ensure we're investing in the right mix of products, services and feeds. Data is the lifeblood of threat intelligence programs, but we can't implement a successful program based on feeds alone.

Threat Hunting is one of the most popular techniques used by security analysts for all kinds of investigations. It is both science and, to some degree, inspiration.

State-sponsored programs from China, Russia, Iran and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cyber security warned Wednesday. "The number of cyber threat actors is rising, and they are becoming more sophisticated", the Canadian Centre for Cyber Security said.

Sophos published a report which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level, will shape the threat landscape and IT security in 2021. "Commodity malware can seem like a sandstorm of low-level noise clogging up the security alert system. From what Sophos analyzed, it is clear that defenders need to take these attacks seriously, because of where they might lead.".

The research findings point to an industry whose security teams are seeing the IT and OT environments converging at a rapid pace. Manufacturing organizations are struggling to safeguard OT assets as they are using the same tools to safeguard their IT infrastructure as they are for OT. As a result, IT teams can't keep up with growing volumes of security data or the increasing number of security alerts.

Flashpoint already produces the industry's highest-quality threat intelligence from online illicit communities. By integrating CRFT's no-code security automation into Flashpoint's product suite, the company is now positioned to empower Cyber Threat Intelligence, Fraud, and Security teams to take rapid, automated action from inbound intelligence and event-based alerts.