Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Continue reading Intelligent Adversary Engagement: Deceiving the Attacker

IT threat evolution in Q2 2021. PC statistics

PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Continue reading IT threat evolution in Q2 2021. PC statistics

Detecting unknown threats: a honeypot how-to

Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, explains what honeypots are, why they’re recommended for catching external threats, and how you can set up your own simple SSH-honeypot. Continue reading Detecting unknown threats: a honeypot how-to

Cybereason Experts Take Center Stage at RSA Conference 2021

Cybereason is excited to announce that Chief Information Security Officer Israel Barak and Principal Security Advocate Lodrina Cherne are taking center stage at the RSA Conference on Thursday, May 21, in two speaking sessions. 
The post Cybereason… Continue reading Cybereason Experts Take Center Stage at RSA Conference 2021

U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

175 million IP addresses owned by the U.S. Defense Department have “appeared” on the public internet.
The post U.S. DoD has World’s Largest Honeypot: 6% of Internet Space appeared first on Security Boulevard.
Continue reading U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

Radware Threat Researchers Live: Episode 9

The latest episode of Radware Threat Researchers Live dives into booters and stressers, honeypots, ProxyLogon, the Tokyo Olympics and more.
The post Radware Threat Researchers Live: Episode 9 appeared first on Radware Blog.
The post Radware Threat Res… Continue reading Radware Threat Researchers Live: Episode 9