5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that’s already too late. Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for […]

The post 5 Golden Rules of Threat Hunting appeared first on Security Intelligence.

Continue reading 5 Golden Rules of Threat Hunting

Smartphone-connected device uses light to detect malaria – in 10 seconds

While it’s very important to track malaria infections in at-risk populations, drawing and analyzing blood samples can be problematic. A new device is designed to help, as it uses light to detect the disease within a matter of seconds.Continue ReadingCa… Continue reading Smartphone-connected device uses light to detect malaria – in 10 seconds

Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

When trying to analyze malware, have there been cases where malware detected the use of mitmproxy and ceased operation?
If that has happened, would it be a good idea to be constantly using a proxy as a measure for deterring any malware?

Continue reading Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

Cancer-sniffing ants prove as accurate as dogs in detecting disease

A fascinating new proof-of-concept study from a team of researchers in France suggests trained ants could be effective at detecting cancer in humans. The researchers demonstrated a certain species of ant can be quickly trained to detect cancerous cells… Continue reading Cancer-sniffing ants prove as accurate as dogs in detecting disease