Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.

The post Why You Should Start Leveraging Network Flow Data Before the Next Big Breach appeared first on Security Intelligence.

Continue reading Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

A Beginner’s Guide to Threat Hunting

Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.

The post A Beginner’s Guide to Threat Hunting appeared first on Security Intelligence.

Continue reading A Beginner’s Guide to Threat Hunting

Threat Hunters Hansel and Gretel Keep the Forest Safe

Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.

The post Threat Hunters Hansel and Gretel Keep the Forest Safe appeared first on Security Intelligence.

Continue reading Threat Hunters Hansel and Gretel Keep the Forest Safe

Advanced Approaches to ATM Network Protection

Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.

The post Advanced Approaches to ATM Network Protection appeared first on Security Intelligence.

Continue reading Advanced Approaches to ATM Network Protection

Ninety-Five Percent of Webshell Attacks Written in PHP

Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.

The post Ninety-Five Percent of Webshell Attacks Written in PHP appeared first on Security Intelligence.

Continue reading Ninety-Five Percent of Webshell Attacks Written in PHP

Organized Cybercrime’s New Bull’s-eye: Bankers

Attackers are attempting to pull off their cybercrime exploits by targeting the human element in banks and other financial institutions.

The post Organized Cybercrime’s New Bull’s-eye: Bankers appeared first on Security Intelligence.

Continue reading Organized Cybercrime’s New Bull’s-eye: Bankers

Cybersecurity Checkup: Tell Us Where It Hurts

Have you ever noticed that your company’s cybersecurity system is very much like an immune system? They both strengthen your defenses against threats.

The post Cybersecurity Checkup: Tell Us Where It Hurts appeared first on Security Intelligence.

Continue reading Cybersecurity Checkup: Tell Us Where It Hurts