Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA

SecurityWeek spoke with Mike Britton, CISO at Abnormal Security, to understand what the company has learned about current social engineering and phishing attacks.
The post Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA … Continue reading Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA

IntelOwl: Open-source threat intelligence management

IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a s… Continue reading IntelOwl: Open-source threat intelligence management

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication

The ransomware scourge is still growing and still successful for attackers, Rapid7’s Ransomware Radar Report 2024 shows.
The post Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication appeared first on SecurityWeek.
Continue reading Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains

AWS says a massive neural network graph model with 3.5 billion nodes and 48 billion edges is speeding up the prediction and detection of malicious domains.
The post AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domain… Continue reading AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains

MISP: Open-source threat intelligence and sharing platform

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professiona… Continue reading MISP: Open-source threat intelligence and sharing platform

How AI helps decode cybercriminal strategies

With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible business benef… Continue reading How AI helps decode cybercriminal strategies