HawkEye Malware Operators Renew Attacks on Business Users

IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.

The post HawkEye Malware Operators Renew Attacks on Business Users appeared first on Security Intelligence.

Continue reading HawkEye Malware Operators Renew Attacks on Business Users

Comprehensive Vulnerability Management in Connected Security Solutions

To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems.

The post Comprehensive Vulnerability Management in Connected Security Solutions appeared first on Security Intelligence.

Continue reading Comprehensive Vulnerability Management in Connected Security Solutions

5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.

The post 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics appeared first on Security Intelligence.

Continue reading 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

Is Malware Analysis Right for Your Business?

For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.

The post Is Malware Analysis Right for Your Business? appeared first on Security Intelligence.

Continue reading Is Malware Analysis Right for Your Business?

Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

Dwell times for data compromises are still shockingly high. Understand how to detect a breach in your network to improve response and mitigation time.

The post Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently appeared first on Security Intelligence.

Continue reading Don’t Dwell On It: How to Detect a Breach on Your Network More Efficiently

How to Leverage Log Services to Analyze C&C Traffic

Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.

The post How to Leverage Log Services to Analyze C&C Traffic appeared first on Security Intelligence.

Continue reading How to Leverage Log Services to Analyze C&C Traffic

How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.

The post How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management appeared first on Security Intelligence.

Continue reading How to Defend With the Courses of Action Matrix and Indicator Lifecycle Management

How Pivoting Can Help Your Incident Response Process

Indicators of compromise are key data points used during an incident response process. Regularly testing the reliability of your indicators can make all the difference in your IT security process.

The post How Pivoting Can Help Your Incident Response Process appeared first on Security Intelligence.

Continue reading How Pivoting Can Help Your Incident Response Process

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.

The post Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise appeared first on Security Intelligence.

Continue reading Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Surfing the Tsunami of Threat Data With Cognitive Security

Nowadays, most organizations’ networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.

The post Surfing the Tsunami of Threat Data With Cognitive Security appeared first on Security Intelligence.

Continue reading Surfing the Tsunami of Threat Data With Cognitive Security