Security News

GSMA releases Mobile Threat Intelligence Framework
2024-04-10 03:00

GSM Association's Fraud and Security Group has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures that they use.The Mobile Threat Intelligence Framework is focused on mobile network-related attacks that are not already covered by existing public frameworks like MITRE ATT&CK and MITRE FiGHT. In scope are 2G, 3G, 4G, 5G, including all kind of telecommunication service enablers and future mobile technology evolutions.

How threat intelligence data maximizes business operations
2024-03-26 05:00

Threat intelligence is no longer a 'nice to have' for organizations but a 'must,' as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new approach to maximizing operations and making more effective business decisions.

Building a Robust Threat Intelligence with Wazuh
2023-12-07 10:51

Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a...

AI and contextual threat intelligence reshape defense strategies
2023-11-24 04:00

AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive more proactive cybersecurity efforts with contextual threat intelligence, according to Cybersixgill. As organizations increasingly adopt Threat Exposure Management - a proactive approach to cybersecurity - Cybersixgill believes that cyber threat intelligence will emerge as a foundational component of TEM and play a central role as leaders across organizations make critical, strategic business decisions.

Yeti: Open, distributed, threat intelligence repository
2023-10-12 04:00

I serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you the effort.

The Interdependence between Automated Threat Intelligence Collection and Humans
2023-09-15 11:13

Proactive threat intelligence was not automated threat intelligence, however. Automated threat intelligence helped teams operate more efficiently, but it presented a novel challenge: How to manage and make sense of all the data that automated threat intelligence processes produced.

Threat intelligence’s key role in mitigating malware threats
2023-08-11 04:00

Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence. Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and move laterally to gain long-term access, cause damage, or exfiltrate data and trade secrets.

Introducing the book: Visual Threat Intelligence
2023-06-16 04:00

In this Help Net Security video interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses his new book – Visual Threat Intelligence. The book covers a wide range of topics,...

DarkBERT could help automate dark web mining for cyber threat intelligence
2023-05-19 10:02

Researchers have developed DarkBERT, a language model pretrained on dark web data, to help cybersecurity pros extract cyber threat intelligence from the Internet's virtual underbelly. A team of researchers from Korea Advanced Institute of Science and Technology and data intelligence company S2W has decided to test whether a custom-trained language model could be useful, so they came up with DarkBERT, which is pretrained on dark web data.

How to Set Up a Threat Hunting and Threat Intelligence Program
2023-05-08 11:49

Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this article will help you ramp up your threat intelligence program.