Security News

The latest threat intelligence to help you fortify your IT security
2022-03-01 21:58

Threat actors are now executing attacks at speeds never witnessed before. Say, a suspicious event is found on Point Product A. The first action that probably needs to be done is a cross-reference with Point Product B and/or Point Product C. Then another step may be needed to cross-verified with a SIEM. This manual process must be done quickly to keep up with the speed of the threat attacks.

Russia is the advanced persistent threat that just triggered. Ready?
2022-02-28 09:30

The worst security looks much the same as the best. By way of justifying the invasion, he made a speech saying that Ukraine is not a country, that the West is an evil empire, and that Russia's security concerns are paramount.

Are separate SIEMs for threat hunting a good idea?
2022-02-23 06:30

In this interview with Help Net Security, Brian Dye, CEO at Corelight, talks about the trend of creating separate SIEMs for threat hunting and why this is not achieveable for all organizations. We are seeing companies establishing separate SIEMs for threat hunting.

The machine fights back: AI that fights cyber-threats on behalf of humans
2022-02-22 18:00

Security, orchestration, automation, and response platforms try to make analysts' lives easier by mapping out automated incident response playbooks that coordinate activities between security appliances. The AI comes in especially useful here given email's popularity as an attack vector.

A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022
2022-02-21 11:06

It offers businesses a free solution to the following top six cyber threats - and then some. Once it gets into a business network, it will encrypt valuable data and demand payment to return access to that data to the business.

CISA warns of hybrid operations threat to US critical infrastructure
2022-02-19 15:00

CISA urged leaders of U.S. critical infrastructure organizations on Friday to increase their orgs' resilience against a growing risk of being targeted by foreign influence operations using misinformation, disinformation, and malformation tactics. "Multiple influence operations coordinated by foreign actors had an impact on US critical services and functions across critical sectors," according to the cybersecurity agency.

Cyber threat intelligence software: How to choose the right CTI tools for your business
2022-02-18 23:04

Cyber threat intelligence is a concept that is crucial to the security of corporate networks, yet it can be difficult to really understand the ideas behind it, not to mention the implementation of threat intelligence within the company's IT and security structures. Before diving into what cyber threat intelligence is, it is essential to understand what the word "Threat" defines.

Microsoft Warns of 'Ice Phishing' Threat on Web3 and Decentralized Networks
2022-02-18 22:08

Microsoft has warned of emerging threats in the Web3 landscape, including "Ice phishing" campaigns, as a surge in adoption of blockchain and DeFi technologies emphasizes the need to build security into the decentralized web while it's still in its early stages. The company's Microsoft 365 Defender Research Team called out various new avenues through which malicious actors may attempt to trick cryptocurrency users into giving up their private cryptographic keys and carry out unauthorized fund transfers.

Cyberattack threat: Corporate users infected via Microsoft Teams
2022-02-18 14:31

Cyberattack threat: Corporate users infected via Microsoft Teams. Researchers from Avanan, a Check Point company, have announced the discovery of attacks exploiting the Microsoft Teams communication platform to infect corporate users.

Top threat activities this year
2022-02-17 05:30

ZeroFox published a threat intelligence forecast for 2022, detailing expected cybercriminal behavior trends including ransomware, malware-as-a-service, vulnerabilities and exploits. Within the report, the ZeroFox Intelligence team reviews 12 months of threat actor activity from 2021 and provides go-forward recommendations for security teams as we continue into 2022.