Security News

Week in review: Cyber threat hunting, Android DDoS botnet, drone bug bounty (Help Net Security)
2017-09-03 18:00

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails Ransomware campaigns are usually...

The "Imitation Game" - The Need for Human Intelligence in Threat Operations (Security Week)
2017-08-31 13:08

“What if only a machine could defeat another machine?” read more

Leveraging social media in advanced threat intelligence (Help Net Security)
2017-08-30 13:00

In this podcast recorded at Black Hat USA 2017, Christian Lees, CISO at InfoArmor, discusses how leveraging social media helps to understand the motives and threat landscape from threat actors....

Getting a start on cyber threat hunting (Help Net Security)
2017-08-28 14:15

In this age of advanced persistent threats, waiting for traditional threat management solutions like IDS and SIEM to flag incidents and threats is simply not enough anymore. “We live in a world...

Hacked robots can be a deadly insider threat (Help Net Security)
2017-08-22 18:59

IOActive researchers have probed the security of a number of humanoid home and business robots as well industrial collaborative robots, and have found it seriously wanting. A slew of...

DDoS Threat Increases While Mirai Becomes 'Pay-for-Play' (Security Week)
2017-08-22 17:52

The DDoS threat is increasing again. Pbot can generate 75 Gbps from just 400 nodes and Mirai has been commoditized. However, despite the growing number of attacks, the overall trend seems to be...

Sqrrl empowers threat hunters with self-service analytics (Help Net Security)
2017-08-21 12:30

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package rigid algorithms....

CISO Perspective: Process is Key to Your Threat Intelligence Program (Security Week)
2017-08-18 13:22

Continuing our examination of the cyber threat intelligence mind map, we move from the different levels of threat intel (Strategic, Operational read more

Regulations and Threats: Adapting to the Landscape (InfoRiskToday)
2017-08-17 15:48

From zero-day exploits to IoT vulnerabilities to the sheer number of prospective adversaries, the threat landscape is ever-shifting. And global regulatory pressures are only mounting. How must...