What are Indicators of Compromise in Threat Intelligence?
Managing security in today’s highly interconnected world can be like trying to put out fires with a collection of squirt guns. You have the tools, but they never feel powerful enough. With security teams working tirelessly to protect systems, networks, and data, they need the information that empowers them by helping them prioritize their activities. […]
Attack Surface Analysis: 3 Keys to Success
Attack surfaces are constantly expanding. Thanks to prevalent use of the cloud, more interconnected applications, and more smart devices, the digital footprints of most organizations are growing. With those apps and devices, however, come more vulnerabilities for attackers to exploit. According to a recent report, 2 out of 3 organizations say their external attack surface […]
Threat Intelligence Management: Best Practices
Security teams rely on threat intelligence like a ship’s captain relies on a lighthouse. The information enables them to see new risks and steer clear of known threats. While threat intelligence provides benefits, many security teams struggle to use it effectively. They collect the information from various tools, meaning that they have no single source […]
Browser Fingerprint Spoofing: A New Cyber Risk
If one sure thing exists in the security and privacy area, it’s that cybercriminals will always find ways to use technological advances against users. With the internet as a fundamental communication and commercial technology, data derived from users’ online activities has become more important to businesses and organizations. Most companies use browser fingerprinting for legitimate […]
Threat Tracking: Tracking Threats Across the Dark and Clear Web
The Internet is a gold mine of threat information that can bolster your cyber defenses if you actively track this data. From news updates to forum discussions on hacker forums, and data dumps to service offerings on marketplaces, there’s a lot to find out that could otherwise slip under the radar. Tracking cyber threats across […]
9 Open Source Threat Intelligence Sources
Keeping up with cybersecurity news is a challenge. From newly discovered vulnerabilities to new attack methodologies, you live a life of “need to know” when ability to find is difficult. As a security professional, knowing is more than half the battle. To stay within your budget, you need the open source threat intelligence resources that […]
Log4j, GitHub Repositories, and Attack Surfaces
Numerous security practitioners and software development teams often utilize public repositories in their daily roles. The goal of these public repositories is to help teams collaborate on improving coding, fixing vulnerabilities, and support building high-quality software for companies. Two of the most popular types of these repositories are Log4j and GitHub. These two repositories have been […]
The Typology of Illicit Telegram Channels
Cybercriminals seem to always be looking for new and innovative ways to commit their crimes more efficiently. In the past, the dark web and parts of the deep web were some of the most common places where you can find cybercriminals committing their schemes. However, many criminals have moved over to more secure online messaging […]
Diamond Model of Intrusion Analysis: A Quick Guide
Any intrusion into a network calls for a thorough analysis to give security teams cyber intelligence about different threats and to help thwart similar future attacks. However, effective incident analysis has long been held back by uncertainty and high false positive rates in intrusion detection systems that lead to slow threat mitigation. The diamond model […]
Automating Your Red Team Approach: A Quick Guide
Your organization may be prepared for an attack. You may have all the recommended security controls and your employees may be well-trained when it comes to avoiding social engineering attacks. You cannot truly be prepared, however, until you test your defenses. Traditionally, this is done by bringing in experts to hack your systems, discover the […]