What Will Take Emotet’s Place?

Emotet’s seven-year reign of terror will come to an end Sunday, April 25, 2021 – at least in theory, when law enforcement completes a scheduled mass uninstallation of its infrastructure. A ‘scheduled uninstallation.’ Talk about going… Continue reading What Will Take Emotet’s Place?

Take a Moment to Hug Your Friends & Family: RIP Dan Kaminsky

The security world was rocked this weekend when word came out that one of the best of us, Dan Kaminsky, passed away. Dan was only 42 years old. To say he’s gone way too soon doesn’t even come close here. According to a message posted on Twitter … Continue reading Take a Moment to Hug Your Friends & Family: RIP Dan Kaminsky

China Silently Hacked Gov’t and Defense for a Year or More

After SolarWinds and the Exchange débâcle, here’s the third shoe to drop.
The post China Silently Hacked Gov’t and Defense for a Year or More appeared first on Security Boulevard.
Continue reading China Silently Hacked Gov’t and Defense for a Year or More

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them fr… Continue reading The Aggregation Model is Falling Short

CrowdStrike + Corelight partner to reach new heights

By Lana Knop, Chief Product Officer, Corelight Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alert… Continue reading CrowdStrike + Corelight partner to reach new heights

China’s Cybercriminals Profit From Underground Data Monetization

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed forums showed a cycle that included mult… Continue reading China’s Cybercriminals Profit From Underground Data Monetization

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker… Continue reading 3 Keys to Defending Active Directory

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many parts of the world, I heard multiple vendors of intelligent video surveillance e… Continue reading Are TIPs Finally Converging With SIEMs?

Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons

The government of the United Kingdom is investigating the proposed “merger” of ARM and Nvidia, on national security grounds.
The post Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons appeared first on Security Boulevard.
Continue reading Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons

Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

In the imperfect, real world, where SOC teams actually live, the SIEM log-based approach is fundamentally flawed. In fact, it tends to add more challenge to the workday for SOC teams, not less.
The post Log Data is Not Effective as a Foundation for Pre… Continue reading Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics