Google seeks to make Cobalt Strike useless to attackers

Google Cloud’s intelligence research and applications team has created and released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by attackers. “Our intention is to move the tool back to the domain of leg… Continue reading Google seeks to make Cobalt Strike useless to attackers

Top enterprise email threats and how to counter them

A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. According to the report, 94% of organizations experienced a spear phishing or impersonation attack, and 92% suffer… Continue reading Top enterprise email threats and how to counter them

What you should look for in an MDR relationship

The managed IT services market is growing both in size and importance, as more organizations decide it makes fiscal and operational sense to outsource key functions. This is true even for critical security-oriented tasks, due to both environmental and … Continue reading What you should look for in an MDR relationship

The challenges and advantages of building behavior-based threat detection

In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of malicious actors, organizations must shift their gaze to detect attackers before s… Continue reading The challenges and advantages of building behavior-based threat detection

MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

The MITRE ATT&CK threat framework is seemingly everywhere these days, and with good reason. It is an invaluable tool for understanding the various methods, or as MITRE refers to them Tactics and Techniques, employed by threat actors. It offers annotated and curated details about those methods, and it provides the capability to visualize this data […]

The post MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be? appeared first on Security Intelligence.

Continue reading MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

7 threat detection challenges CISOs face and what they can do about it

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and t… Continue reading 7 threat detection challenges CISOs face and what they can do about it

Top 5 security analytics to measure

You don’t need a Ph.D. in cybersecurity to recognize the importance of security analytics. Security analytics uses data analysis – often aided by machine learning – to detect security threats and measure the effectiveness of security operations. … Continue reading Top 5 security analytics to measure

New threat groups and malware families emerging

Mandiant announced the findings of an annual report that provides timely data and insights based on frontline investigations and remediations of high-impact cyber attacks worldwide. The 2022 report––which tracks investigation metrics between October 1,… Continue reading New threat groups and malware families emerging

CrowdStrike, Mandiant announce ‘strategic partnership’

CrowdStrike’s Falcon platform will be integrated into Mandiant’s services for existing customers. More crossover is planned later this year.

The post CrowdStrike, Mandiant announce ‘strategic partnership’ appeared first on CyberScoop.

Continue reading CrowdStrike, Mandiant announce ‘strategic partnership’

Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating threats, too many organizations have made the mistake of relying on EDR as their… Continue reading Why EDR is not sufficient to protect your organization