How a More Connected Approach Can Help With Threat Management

Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.

The post How a More Connected Approach Can Help With Threat Management appeared first on Security Intelligence.

Continue reading How a More Connected Approach Can Help With Threat Management

Artificial Intelligence (AI) and Security: A Match Made in the SOC

When security analysts partner with artificial intelligence, the benefits include increased productivity, improved job satisfaction, and streamlined threat detection, investigation and response.

The post Artificial Intelligence (AI) and Security: A Match Made in the SOC appeared first on Security Intelligence.

Continue reading Artificial Intelligence (AI) and Security: A Match Made in the SOC

New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users

IBM X-Force researchers have discovered a new campaign targeting organizations with fake business emails that deliver NetWire remote-access Trojan (RAT) variants.

The post New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users appeared first on Security Intelligence.

Continue reading New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users

Resource Smart YARA Scans: Saving CPU and Time with osquery

As attackers continually evolve their tactics, the arsenal of tools at hand for defenders needs to respond to attacker complexity while still enabling day-to-day business to happen.
When it comes to detecting malware, the arms race between attacke… Continue reading Resource Smart YARA Scans: Saving CPU and Time with osquery

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated –… Continue reading Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

Know your enemy: Mapping adversary infrastructure quickly and accurately

Group-IB is a known quantity in the information security arena: in the sixteen years since its inception, the company – now headquartered in Singapore – has detected and detailed many high-profile threats, performed over a thousand successf… Continue reading Know your enemy: Mapping adversary infrastructure quickly and accurately

Cybersecurity industry predictions for 2020 and beyond

When it comes to cybersecurity industry predictions for 2020, Optiv Security researchers expect to see a focus on privacy, evolving threat actors, pervasive deepfake videos, and increased election interference. “As we look beyond 2019 and into 2020, we… Continue reading Cybersecurity industry predictions for 2020 and beyond

What is the actual role of a threat hunter?

The role and tasks of a threat hunter are confusing, according to a ThreatQuotient and SANS study based on data collected from 575 participating companies that either work with or operate their own threat hunting teams. Threat hunter role: How threat h… Continue reading What is the actual role of a threat hunter?

Want to Learn Network Threat Hunting? Get Started with this Free Intro Course

Bricata has teamed up with Cybrary to offer a self-paced course on threat hunting that you can take for free and work at your own pace
The post Want to Learn Network Threat Hunting? Get Started with this Free Intro Course appeared first on Security Bou… Continue reading Want to Learn Network Threat Hunting? Get Started with this Free Intro Course

Protecting the ‘Crown Jewels’ with Threat Hunting

Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch efficiently and do a poor job of understanding … Continue reading Protecting the ‘Crown Jewels’ with Threat Hunting