Zero-Day Exploits: The Anatomy of Unexpected Attacks

Zero-day attacks are on the rise. Not only was 2021 a record-breaking year for the total number of zero-day attacks, but it also accounted for 40% of the zero-day breaches over the last decade. In part, this race to zero is tied to the sheer number of web, mobile and cloud-based applications being developed and […]

The post Zero-Day Exploits: The Anatomy of Unexpected Attacks appeared first on Security Intelligence.

Continue reading Zero-Day Exploits: The Anatomy of Unexpected Attacks

Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem

An inside look at how nation-states use social media to influence, confuse and divide — and why cybersecurity researchers should be involved. Continue reading Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command… Continue reading The Kill Chain Model Works When Analysts See the Full Picture

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps an attacker takes to perform a breach. Malware attacks are among… Continue reading Detecting Bad Actors Early in the Kill Chain