Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort.
The post Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs appeared first… Continue reading Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

March Madness Requires Vigilance on Both an Individual and Corporate Level

Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program.
The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first on Se… Continue reading March Madness Requires Vigilance on Both an Individual and Corporate Level

VulnCheck Raises $12 Million for Vulnerability Intelligence Platform

Exploit and vulnerability intelligence provider VulnCheck has raised $12 million in a Series A funding round.
The post VulnCheck Raises $12 Million for Vulnerability Intelligence Platform appeared first on SecurityWeek.
Continue reading VulnCheck Raises $12 Million for Vulnerability Intelligence Platform

Who is sending those scammy text messages about unpaid tolls?

The latest smishing scam follows a familiar process as ones the industry has seen over the past decade.

The post Who is sending those scammy text messages about unpaid tolls? appeared first on CyberScoop.

Continue reading Who is sending those scammy text messages about unpaid tolls?

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security feeds using a message queuing protocol. “Originally designed for CSI… Continue reading IntelMQ: Open-source tool for collecting and processing security feeds

Cybercriminals picked up the pace on attacks last year

Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.

The post Cybercriminals picked up the pace on attacks last year appeared first on CyberScoop.

Continue reading Cybercriminals picked up the pace on attacks last year

Man vs. machine: Striking the perfect balance in threat intelligence

In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process massive data sets, the nuanced judgment of experienced anal… Continue reading Man vs. machine: Striking the perfect balance in threat intelligence

Salt Typhoon gained initial access to telecoms through Cisco devices

The Chinese nation-state threat group primarily gained access to Cisco devices with legitimate login credentials, according to Cisco Talos.

The post Salt Typhoon gained initial access to telecoms through Cisco devices appeared first on CyberScoop.

Continue reading Salt Typhoon gained initial access to telecoms through Cisco devices