Security News

How to Set Up a Threat Hunting and Threat Intelligence Program
2023-05-08 11:49

Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this article will help you ramp up your threat intelligence program.

The Era of Cyber Threat Intelligence Sharing
2022-12-22 12:39

As the internet continues to expand and connect more people and devices than ever before, the need for effective cyber threat intelligence sharing has never been greater. In today's interconnected world, a threat to one organization can quickly become a threat to many others, making it essential for businesses and other organizations to share information and work together to stay safe online.

Microsoft widens enterprise access to its threat intelligence pool
2022-08-03 21:31

Microsoft says it will give enterprise security operation centers broader access to the massive amount of threat intelligence it collects every day.Both services - Defender Threat Intelligence and Defender External Attack Surface Management - use technologies that Microsoft inherited when it bought cybersecurity company RiskIQ for $500 million in 2021.

How to develop competency in cyber threat intelligence capabilities
2022-05-25 13:40

Mandiant is a companies whose business centers around digital forensics and incident response as well as cyber threat intelligence. Understanding complex challenges and developing solutions to solve them is key to CTI. The investigative mindset needs experienced understanding of cyber threat actors' TTP as well as CTI tools, frameworks and IT systems.

Threat Intelligence: The Key to Higher Security Operation Performance
2022-05-25 00:00

The internet has become the catalyst to an ever-growing global economy. At its foundation, it was designed for connectivity, but not security.

Extended Threat Intelligence: A new approach to old school threat intelligence
2022-03-28 05:00

New solutions such as Extended Threat Intelligence are needed. There are some platforms that bring a new approach that integrates Cyber Threat Intelligence, Digital Risk Protection, and External Attack Surface Management capabilities to realign security thinking from that of a defender to that of an attacker.

The latest threat intelligence to help you fortify your IT security
2022-03-01 21:58

Threat actors are now executing attacks at speeds never witnessed before. Say, a suspicious event is found on Point Product A. The first action that probably needs to be done is a cross-reference with Point Product B and/or Point Product C. Then another step may be needed to cross-verified with a SIEM. This manual process must be done quickly to keep up with the speed of the threat attacks.

Cyber threat intelligence software: How to choose the right CTI tools for your business
2022-02-18 23:04

Cyber threat intelligence is a concept that is crucial to the security of corporate networks, yet it can be difficult to really understand the ideas behind it, not to mention the implementation of threat intelligence within the company's IT and security structures. Before diving into what cyber threat intelligence is, it is essential to understand what the word "Threat" defines.

Secureworks Threat Intelligence Executive Report 2021 Vol 6
2022-02-03 00:00

The Secureworks Counter Threat Unit™ research team analyses security threats and helps organizations protect their systems. During September and October 2021, CTU researchers observed notable developments in threat behaviours, the global threat landscape, and security trends, and identified lessons to consider.

Review: Group-IB Threat Intelligence & Attribution (TI&A)
2022-02-01 06:30

The product reviewed here is Group-IB's solution offering customer-tailored data on threats and attackers: Threat Intelligence & Attribution. Most of them are only available for Group-IB Threat Intelligence & Attribution customers due to a restricted sharing policy, like the fourth volume of its Hi-Tech Crime Trends 2021/2022 report "Cyberwarfare: state-sponsored operations in cyberspace." The reports differ on several points: topic, depth, and publishing frequency.