Three Steps to Stop a Threat Before It Becomes an Incident

Threats today use devices and servers to gain access to data and the corporate environment. That’s why organizations need an incident response strategy.

The post Three Steps to Stop a Threat Before It Becomes an Incident appeared first on Security Intelligence.

Continue reading Three Steps to Stop a Threat Before It Becomes an Incident

Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim

The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.

The post Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim appeared first on Security Intelligence.

Continue reading Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim

Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture

Strategic relationships may be an organization’s principal source for obtaining essential artifacts in incident response investigations.

The post Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture appeared first on Security Intelligence.

Continue reading Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture

Unraveling ZeuS.Maple’s Stealth Loader

ZeuS.Maple is a relatively new variant of a stealth loader that enables a few tricks to stay under the radar of security researchers and tools.

The post Unraveling ZeuS.Maple’s Stealth Loader appeared first on Security Intelligence.

Continue reading Unraveling ZeuS.Maple’s Stealth Loader

Know Your Enemy: Understanding the Motivation Behind Cyberattacks

Understanding the motivation behind cyberattacks — and knowing who could be after your organization — can help you reduce your security risk.

The post Know Your Enemy: Understanding the Motivation Behind Cyberattacks appeared first on Security Intelligence.

Continue reading Know Your Enemy: Understanding the Motivation Behind Cyberattacks

The Silver Lining of a Ransomware Infection

If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization’s environment.

The post The Silver Lining of a Ransomware Infection appeared first on Security Intelligence.

Continue reading The Silver Lining of a Ransomware Infection

Black Hats and White Hats: If Cybersecurity Were a Western

If white hats hope to outduel the black hats, they need to learn to collaborate and share information just as their enemies do.

The post Black Hats and White Hats: If Cybersecurity Were a Western appeared first on Security Intelligence.

Continue reading Black Hats and White Hats: If Cybersecurity Were a Western

The Bacon of Security: How Threat Intelligence Complements Cloud Protection

Threat intelligence is one security seasoning that most people can’t get enough of, and now it’s being added to cloud security.

The post The Bacon of Security: How Threat Intelligence Complements Cloud Protection appeared first on Security Intelligence.

Continue reading The Bacon of Security: How Threat Intelligence Complements Cloud Protection

The InfoSecond, Week of March 21: X-Force Report, Thingbots and More!

Bracket busted? Don’t worry, we’ve got a brand new episode of The InfoSecond to take your mind off of your team’s crushing loss.

The post The InfoSecond, Week of March 21: X-Force Report, Thingbots and More! appeared first on Security Intelligence.

Continue reading The InfoSecond, Week of March 21: X-Force Report, Thingbots and More!

Is It the Breadth of the Breach or the Value of the Volume?

Organizations that suffer a breach face extremely high costs, but cybercriminals don’t have to cough up as much to start building profiles of victims.

The post Is It the Breadth of the Breach or the Value of the Volume? appeared first on Security Intelligence.

Continue reading Is It the Breadth of the Breach or the Value of the Volume?