Security News

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
2024-10-29 07:36

The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual...

5 Techniques for Collecting Cyber Threat Intelligence
2024-10-16 09:28

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are...

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
2024-09-16 07:12

Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical "threat...

OpenCTI: Open-source cyber threat intelligence platform
2024-08-21 04:30

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards.

IntelOwl: Open-source threat intelligence management
2024-08-14 04:30

IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive...

MISP: Open-source threat intelligence and sharing platform
2024-08-05 04:00

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis....

Threat intelligence: A blessing and a curse?
2024-08-01 04:25

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Typically, security teams gather large amounts of threat intelligence from multiple places in different and incompatible formats.

Cyber Threat Intelligence: Illuminating the Deep, Dark Cybercriminal Underground
2024-07-30 10:50

Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. This comprehensive analysis, compiled by Cybersixgill's cyber threat intelligence experts, provides valuable insights into the tactics, techniques, and technologies employed by threat actors worldwide.

Ease the Burden with AI-Driven Threat Intelligence Reporting
2024-06-24 11:21

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat...

Akira: Perhaps the next big thing in ransomware, says Tidal threat intelligence chief
2024-06-09 12:10

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.