How the Role of the Modern Security Analyst is Changing

As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing regulatory compliance oversight.&#160… Continue reading How the Role of the Modern Security Analyst is Changing

X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware

IBM X-Force Incident Response and Intelligence Services (IRIS) recently helped a company fend off a ransomware attack by building a custom decryptor for a strain of ransomware known as “Jest.”

The post X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware appeared first on Security Intelligence.

Continue reading X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

As the ongoing COVID-19 pandemic impacts small businesses in the U.S., cybercriminals are trusting that people will be more likely to open unsolicited emails purporting to come from relevant entities.

The post SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT appeared first on Security Intelligence.

Continue reading SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

With elevated endpoint risk and the need to respond rapidly to cybersecurity incidents, a managed detection and response (MDR) team can deploy quickly to virtually supplement your security teams.

The post COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface appeared first on Security Intelligence.

Continue reading COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

Shmoocon 2020 – Xena Olsen’s ‘Adversary Detection Pipelines: Finally Making Your Threat Intel Useful’

Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist for everyone to view, learn and, of course, enjoy.
Permalink
The post Shmoocon 2020 – Xena Olse… Continue reading Shmoocon 2020 – Xena Olsen’s ‘Adversary Detection Pipelines: Finally Making Your Threat Intel Useful’

COVID-19 / Coronavirus: Threats Facing a Remote Workforce and Industry

The post COVID-19 / Coronavirus: Threats Facing a Remote Workforce and Industry appeared first on Fidelis Cybersecurity.
The post COVID-19 / Coronavirus: Threats Facing a Remote Workforce and Industry appeared first on Security Boulevard.
Continue reading COVID-19 / Coronavirus: Threats Facing a Remote Workforce and Industry

Using Mystery Novel Techniques to Track Down Cyberthreats

If you consider yourself a good sleuth who can predict the end of every Agatha Christie novel, you might have a knack for discovering the origins of cyberthreats.

The post Using Mystery Novel Techniques to Track Down Cyberthreats appeared first on Security Intelligence.

Continue reading Using Mystery Novel Techniques to Track Down Cyberthreats