#threat-intelligence

[ follow ]
#cybersecurity

Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks

Storm-0501 targets U.S. sectors for ransomware attacks, exploiting cloud vulnerabilities and weak credentials for extensive data exfiltration.

Number of Active Ransomware Groups Highest on Record

The rise in active ransomware groups has increased risks for businesses, highlighting the need for robust cybersecurity measures.

Flying Under the Radar - Security Evasion Techniques

Phishing attacks have evolved from simple scams to sophisticated techniques that challenge modern security measures.

VMware ESXi flaw leveraged by BlackByte ransomware

BlackByte ransomware group is evolving tactics, exploiting VMware vulnerability to compromise enterprise infrastructure and evade detection.

Schools under siege: from nation-states to ransomware gangs

Education institutions are critical targets for cybercriminals due to their handling of sensitive information and their lack of resources to defend against attacks.

New Loader Masquerades as Antivirus to Deliver SSLoad

PhantomLoader uses advanced evasion techniques to deliver SSLoad malware, posing significant threats to systems through phishing and deception.

Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks

Storm-0501 targets U.S. sectors for ransomware attacks, exploiting cloud vulnerabilities and weak credentials for extensive data exfiltration.

Number of Active Ransomware Groups Highest on Record

The rise in active ransomware groups has increased risks for businesses, highlighting the need for robust cybersecurity measures.

Flying Under the Radar - Security Evasion Techniques

Phishing attacks have evolved from simple scams to sophisticated techniques that challenge modern security measures.

VMware ESXi flaw leveraged by BlackByte ransomware

BlackByte ransomware group is evolving tactics, exploiting VMware vulnerability to compromise enterprise infrastructure and evade detection.

Schools under siege: from nation-states to ransomware gangs

Education institutions are critical targets for cybercriminals due to their handling of sensitive information and their lack of resources to defend against attacks.

New Loader Masquerades as Antivirus to Deliver SSLoad

PhantomLoader uses advanced evasion techniques to deliver SSLoad malware, posing significant threats to systems through phishing and deception.
morecybersecurity
#cyber-security

AWS introduces Mithra advanced threat intelligence neural network | App Developer Magazine

AWS employs advanced threat intelligence tools to protect customer data, ensuring quick identification and counteraction of cyber threats.

Phishing links becoming bigger threat than email attachments | Computer Weekly

Cyber criminals are shifting from malware attachments to malicious links, significantly increasing email attack volumes in 2024.

Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoon

The partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are enhancing cyber security through public-private partnerships.

5 Techniques for Collecting Cyber Threat Intelligence

Understanding the current cyber threat landscape is essential for organizations to defend against threats effectively.

4 essential questions to ask about a prospective SIEM

The SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.
Effective SIEM solutions are critical amid rising cyber threats and data management challenges.
Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.

AWS introduces Mithra advanced threat intelligence neural network | App Developer Magazine

AWS employs advanced threat intelligence tools to protect customer data, ensuring quick identification and counteraction of cyber threats.

Phishing links becoming bigger threat than email attachments | Computer Weekly

Cyber criminals are shifting from malware attachments to malicious links, significantly increasing email attack volumes in 2024.

Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoon

The partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are enhancing cyber security through public-private partnerships.

5 Techniques for Collecting Cyber Threat Intelligence

Understanding the current cyber threat landscape is essential for organizations to defend against threats effectively.

4 essential questions to ask about a prospective SIEM

The SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.
Effective SIEM solutions are critical amid rising cyber threats and data management challenges.
Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.
morecyber-security

Google says Iranian hackers are trying to access emails of Harris and Trump

Iranian cyber intrusion efforts are intensifying as the U.S. presidential election approaches, targeting notable political figures.

AI is responsible for 40% of business email compromise (BEC) emails

The Q2 2024 Email Threat Trends Report by VIPRE Security Group highlights the prevalence of AI-generated BEC attacks, urging the adoption of advanced threat detection solutions and security awareness training.

OpenSSF launch Siren for Open Source Threat Intelligence

OpenSSF launched Siren to share threat intelligence for open source projects like corporate TIPs, filling a critical gap in underserved communities.

Enhanced Security for Enterprises: Google Launches Google Threat Intelligence

Google Cloud introduced Google Threat Intelligence at RSA Conference, offering comprehensive security features for large organizations.

Digital Element Named Winner of the Coveted Global InfoSec Awards

IP geolocation analytics are crucial in the complex cybersecurity landscape, aiding in robust security solutions.

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies | TechRepublic

Cyber threat hunting aims to detect malicious activities and enhance an organization's resilience against attacks.
Hypothesis-driven hunting involves forming assumptions based on threat intelligence to uncover potential security breaches.

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Ransomware threats in Asia-Pacific vary by jurisdiction and sector
Intelligence on specific attack trends can enhance ransomware defense

Scattered Spider chooses RansomHub, Qilin for latest attacks

Scattered Spider cybercrime group shift to RansomHub and Qilin ransomware showcases evolving tactics and power dynamics in hacking groups.

The first attempt to replace SORBS didn't take long

Data443 stepping in to provide free spam blocklist service for former SORBS users.
[ Load more ]