Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators

While there are many cyberthreat intelligence tools and platforms that can locate indicators for you, it is important to understand the process yourself before relying on a tool.

The post Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators appeared first on Security Intelligence.

Continue reading Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators

How your screen’s brightness could be leaking data from your air-gapped computer

It may not be the most efficient way to steal data from an organisation, let alone the most practical, but researchers at Ben-Gurion University in Israel have once again detailed an imaginative way to exfiltrate information from an air-gapped computer…. Continue reading How your screen’s brightness could be leaking data from your air-gapped computer

Maze Ransomware Behind Pensacola Attack, Data Breach Looms

Maze exfiltrates data as well as locks down systems. Officials said they don’t know yet whether any residents’ personal information has been breached.  Continue reading Maze Ransomware Behind Pensacola Attack, Data Breach Looms

New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data

Cybersecurity researchers have discovered a new computer virus associated with the Stealth Falcon state-sponsored cyber espionage group that abuses a built-in component of the Microsoft Windows operating system to stealthily exfiltrate stolen data to a… Continue reading New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data

LinkedIn’s Bad Behaviors, The Data Exfiltration Gambit

Bad Behaviors should not be tolerated… Behold, and examine, if you will, the data exfiltrated (in this case, the inventory of extensions installed in your broweser, and data contained therein) by Linkedin (Nasdaq: LNKD) when the user authenticates … Continue reading LinkedIn’s Bad Behaviors, The Data Exfiltration Gambit

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild.

Hidden Cobra, also known as Laza… Continue reading North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data