CAPEC: Making Heads or Tails of Attack Patterns

The CAPEC standard for attack categorization enables analysts to more efficiently classify, prioritize and communicate about common threats and events.

The post CAPEC: Making Heads or Tails of Attack Patterns appeared first on Security Intelligence.

Continue reading CAPEC: Making Heads or Tails of Attack Patterns

Telnet: An Attacker’s Gateway to the IoT

Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.

The post Telnet: An Attacker’s Gateway to the IoT appeared first on Security Intelligence.

Continue reading Telnet: An Attacker’s Gateway to the IoT

Footprinting and Brute-Force Attacks Remain Prevalent

With so much attention focused on APTs and mutating malware, it’s easy to overlook brute-force attacks — which can still be successful.

The post Footprinting and Brute-Force Attacks Remain Prevalent appeared first on Security Intelligence.

Continue reading Footprinting and Brute-Force Attacks Remain Prevalent