Security News

The benefits of cyber threat intelligence
2021-04-12 04:30

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. You need to plan and invest both time and resources well ahead of time to make sure you're at the right position at the right time to collect intelligence.

Autohost launches Threat Intelligence Platform to mitigate fraud risk in the hospitality industry
2021-03-31 02:00

Autohost launched the Autohost Threat Intelligence platform to help hotels and short-term rental property managers and operators guard against a growing number of risks, including deceptive bookings, identity theft and credit card fraud. The Autohost Threat Intelligence platform is open source, cloud-based and able to integrate with property management systems, and other platforms that operators leverage, to provide additional security context for guest vetting.

FiVerity raises $2M to expand its cyber fraud detection and threat intelligence platform
2021-03-19 00:00

FiVerity announces that it closed a $2 million round of financing to expand its cyber fraud detection and threat intelligence platform, which addresses growing types of cyber fraud for financial institutions. Addressing the escalating rise in cyber fraud, FiVerity has initially focused on fighting synthetic identity fraud - the fastest growing financial fraud at 25% per year that accounts for 20% of consumer credit losses, according to the Federal Reserve, and cost the industry over $20bn last year.

Viasat authorized to use U.S. government provided classified cyber threat intelligence
2021-02-23 00:15

Viasat announced it is part of an elite community of commercial service providers approved to receive cyber threat intelligence through the Department of Homeland Security Enhanced Cybersecurity Services program. As an accredited ECS provider, Viasat will receive DHS-provided sensitive and classified cybersecurity threat indicators and information to defend U.S.-based public and private computer networks, including state and local governments, against unauthorized access, exploitation and data exfiltration.

Elevate the Value of Threat Intelligence in the SOC
2021-02-18 13:49

More organizations are producing and consuming cyber threat intelligence than ever before, and those measuring the effectiveness of their CTI programs is higher than ever - jumping from 4% in 2020 to 38% in 2021, according to the SANS 2021 Cyber Threat Intelligence Survey. A few areas where CTI adoption seems to be lacking are in integration, automation and operationalizing threat intelligence.

In a Remote Work Era, a People-First Approach Keeps Threat Intelligence Teams on Track
2021-01-20 16:34

Be we have to balance this and also not turn remote work into a world where everyone must be available 24/7. People still need to be able to shut off work as well. What we lost in the ability to meet directly with people can be a benefit in a remote world where managers and leaders - who are often the stakeholders the intelligence team needs to talk to - are able to be more efficient.

Anomali automates and speeds essential tasks performed by threat intelligence
2020-12-18 03:30

Anomali has added new features and capabilities across its product suite that further automate and speed essential tasks performed by threat intelligence and security operations analysts. To provide capabilities that work in real-world investigation scenarios, Anomali Threat Research analysts applied their expertise to aid in the design and development of pre-customized, themed threat intelligence dashboards.

Spamhaus Intelligence API: Free threat intelligence data for security developers
2020-12-03 03:00

Spamhaus Technology releases its Intelligence API. This is the first time Spamhaus has released its extensive threat intelligence via API, providing enriched data relating to IP addresses exhibiting compromised behaviour. Available free of charge, developers can readily access enhanced data that catalogues IP addresses compromised by malware, worms, Trojan infections, devices controlled by botnets, and third party exploits, such as open proxies.

Choosing the Right Threat Intelligence Mix
2020-11-23 15:49

Whether working within a company that has deployed an advanced intelligence program or in one just getting started, there are steps we can take to ensure we're investing in the right mix of products, services and feeds. Data is the lifeblood of threat intelligence programs, but we can't implement a successful program based on feeds alone.

Flashpoint acquires CRFT to build automation around actionable threat intelligence
2020-11-19 00:00

Flashpoint already produces the industry's highest-quality threat intelligence from online illicit communities. By integrating CRFT's no-code security automation into Flashpoint's product suite, the company is now positioned to empower Cyber Threat Intelligence, Fraud, and Security teams to take rapid, automated action from inbound intelligence and event-based alerts.