5 Holiday Cybersecurity Tips That Make A Real Impact

Tired of cybersecurity tips that don’t really make an impact? This post is for you.   The year is winding down to an end. Everyone, including security teams, is busy and preoccupied. Cyber actors know this and are gearing up to launch attacks. Over the holiday season, the global number of attempted ransomware attacks has increased […]

The post 5 Holiday Cybersecurity Tips That Make A Real Impact appeared first on Security Intelligence.

Continue reading 5 Holiday Cybersecurity Tips That Make A Real Impact

‘No guns, no guards, no gates.’ NSA opens up to outsiders in fight for cybersecurity

The National Security Agency’s Cybersecurity Collaboration Center is trying to improve threat-sharing with private sector partners.

The post ‘No guns, no guards, no gates.’ NSA opens up to outsiders in fight for cybersecurity appeared first on CyberScoop.

Continue reading ‘No guns, no guards, no gates.’ NSA opens up to outsiders in fight for cybersecurity

FBI director say he’s ‘extremely concerned’ about China’s ability to weaponize TikTok

Christopher Wray said China could control TikTok’s algorithm to support anti-American information operations, posing a serious risk.

The post FBI director say he’s ‘extremely concerned’ about China’s ability to weaponize TikTok appeared first on CyberScoop.

Continue reading FBI director say he’s ‘extremely concerned’ about China’s ability to weaponize TikTok

Top 7 Cybersecurity Threats for 2024

2024 will be a pivotal year for cybersecurity. The global threat landscape is undergoing deep transformations, driven by emerging technologies, new tactics and shifting geopolitical dynamics. Continue reading Top 7 Cybersecurity Threats for 2024

Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

In this paper, Kevin Lamshöft describes how researchers performed a threat analysis for a covert Command and Control (C2) channel using port scans as cover and syslog as carrier for data infiltration.

Session Chair: So, Kevin is presenting Kno… Continue reading Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

Enterprise Forensics: Traditions vs Reality in Modern DFIR

Hans: So our keynote for today. Actually, I ran into Emre (online, of course) Tinaztepe from Binalyze in December. It was an interesting online meeting. I had to understand their technology.

And I’m sure Emre’s going to tell us ab… Continue reading Enterprise Forensics: Traditions vs Reality in Modern DFIR

Mason Toups and Emre Tinaztepe on Efficient Incident Response Through Collaboration

Christa: Efficient, effective digital forensics and incident response involves not just the right tools and processes, but also the ability to share insights and collaborate on work. Here with us on the Forensic Focus Podcast to talk about it &… Continue reading Mason Toups and Emre Tinaztepe on Efficient Incident Response Through Collaboration

Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

Hello. My name is Nataliia Neshenko. I am a PhD candidate in Florida Atlantic University College of Engineering & Computer Science working with Professor Fuhrt and in collaboration with Professor Bou-Harb from the University of Texas in San A… Continue reading Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

How Detego is Helping Banks Protect Customers from the Rising Threat of Fraud

Fraud is one of the biggest threats facing banks and financial institutions worldwide.
The US is home to the highest number of credit card fraud causes globally, losing around $9.47 billion to the crime in 2018. As of 2021, fraud … Read more The… Continue reading How Detego is Helping Banks Protect Customers from the Rising Threat of Fraud