Security News
![While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks Researchers analyzed a...
![Whitepaper: Building a Threat Intelligence Programme (UK)](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best practices and impact of those...
![Questions to Ask Before Choosing a Threat Intelligence RFI Service](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Much like deep & dark web (DDW) coverage and anti-fraud solutions, request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat...
![Pradeo unveils new mobile threat intelligence platform, providing accurate insights on mobile threats](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Pradeo has developed over the last decade a network of millions of sensors across the globe that continuously gathers the most current mobile security events. Thanks to that extensive coverage,...
![The New Threat Intelligence](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Threat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too many organizations are overlooking the value of local intelligence embedded...
![Threat Intelligence: Why Sharing Is Difficult](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has...
![Whitepaper: Maturing a Threat Intelligence Program](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand where your organization...
![Fighting Fraud With Threat Intelligence: Debunking Common Misconceptions](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
The Composition of a Fraud Team or Function is Often Overlooked in th Threat Intelligence Market read more
![Sixgill’s new cyber threat intelligence platform is tailored to meet the needs of MSSPs](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Sixgill, a leading cyber threat intelligence vendor that automates the monitoring, collection and analysis of exclusive-access deep, dark, and surface web sources to detect threats and alert...
![Threat Intelligence Firm Recorded Future Acquired for $780 Million](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Threat intelligence provider Recorded Future announced on Thursday that Insight Partners has agreed to acquire a controlling interest in the company, in addition to the minority stake previously...