StrikeReady Recon assists organizations in protecting their mission-critical infrastructure and systems

StrikeReady launched StrikeReady Recon, a combination of internal and external intelligence that provides a cross-section of the most active and in-the-wild campaigns, intrusions, and attacks targeting organizations globally, assisting them in protecti… Continue reading StrikeReady Recon assists organizations in protecting their mission-critical infrastructure and systems

AttackIQ raises $44M to fuel global growth and vision of security optimization

AttackIQ announced a $44 million Series C funding round led by Atlantic Bridge. Saudi Aramco Energy Ventures (SAEV) and Gaingels also joined existing investors Index Ventures, Khosla Ventures, Salesforce Ventures, and Telstra Ventures, bringing the tot… Continue reading AttackIQ raises $44M to fuel global growth and vision of security optimization

AttackIQ raises $44M to fuel global growth and vision of security optimization

AttackIQ announced a $44 million Series C funding round led by Atlantic Bridge. Saudi Aramco Energy Ventures (SAEV) and Gaingels also joined existing investors Index Ventures, Khosla Ventures, Salesforce Ventures, and Telstra Ventures, bringing the tot… Continue reading AttackIQ raises $44M to fuel global growth and vision of security optimization

Anomali’s quarterly update empowers users to optimize and speed incident response

Anomali announced the availability of its quarterly portfolio update. New capabilities expand visibility for security operations analysts over a wider range of relevant threat intelligence and critical asset data, enable more precise threat detection, … Continue reading Anomali’s quarterly update empowers users to optimize and speed incident response

Hunting for Windows “Features” with Frida: DLL Sideloading

Offensive security professionals have been using Frida for analyzing iOS and Android mobile applications. However, there has been minimal usage of Frida for desktop operating systems such as Windows. Frida is described by the author as a “Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.” From a security research and adversarial simulation perspective, Frida […]

The post Hunting for Windows “Features” with Frida: DLL Sideloading appeared first on Security Intelligence.

Continue reading Hunting for Windows “Features” with Frida: DLL Sideloading

Is it called Drive-by Compromise if attacker provided his website for user to access?

If the website is legitimate and the attacker exploited that legitimate website, and the attacker gains access to a victim’s system that visits the website, then it is a drive-by compromise.
However, if the attacker built the website, and … Continue reading Is it called Drive-by Compromise if attacker provided his website for user to access?

EclecticIQ Platform delivers threat intelligence, hunting, and response capabilities

EclecticIQ launched EclecticIQ Platform, which puts “Intelligence at the core” of cyber defense. The new open and extensible platform, built on the company’s threat intelligence solution (TIP), delivers endpoint detection and response… Continue reading EclecticIQ Platform delivers threat intelligence, hunting, and response capabilities

MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to improve the cybersecurity of National Security Systems, the Department of De… Continue reading MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

Securonix Open XDR offers threat detection and response across endpoints, networks and the cloud

Securonix announced a new product for its cloud-native platform: Securonix Open XDR. The new product comes with Securonix Autonomous Threat Sweep (ATS) and empowers customers with robust threat detection and response capabilities needed to respond swif… Continue reading Securonix Open XDR offers threat detection and response across endpoints, networks and the cloud

The Art and Strategy of Becoming More Cyber Resilient

In the military, the art of strategy is key. It teaches how to win a war through a series of battles, campaigns and tactics. In the cybersecurity world, we have been on the defensive side for as long as we can remember. We focus on frameworks and tactics such as Defense in Depth, the onion […]

The post The Art and Strategy of Becoming More Cyber Resilient appeared first on Security Intelligence.

Continue reading The Art and Strategy of Becoming More Cyber Resilient