Security News

Threat intelligence company Flashpoint this week announced that it received a total of $34 million in investment and debt financing. Of the total amount, $6 million represents new equity from...

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...

One of the most promising developments I’ve seen in threat intelligence over the last year or so is a greater emphasis on use cases. read more

In this Help Net Security podcast recorded at Black Hat USA 2019, Adam Darrah (Director of Intelligence), Mike Kirschner (Chief Operating Officer) and Christian Lees (Chief Technology Officer)...

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. The post Whitepaper: Security...

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing...

Bandura Cyber, the leading provider of automated and actionable, turnkey threat intelligence-driven network security, announced the next generation of its market leading Bandura Cyber Threat...

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks Researchers analyzed a...