Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands […]

The post Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023 appeared first on Security Intelligence.

Continue reading Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Why Threat Analysis Will Continue to Play a Vital Role in Security

Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and false alarms across multiple systems come in amid a severe shortage of skilled workers. In this industry, performing detailed threat analysis with the data you already have will help protect your business. For that, you […]

The post Why Threat Analysis Will Continue to Play a Vital Role in Security appeared first on Security Intelligence.

Continue reading Why Threat Analysis Will Continue to Play a Vital Role in Security

Using Similar Taxonomies To Understand Present And Future Security Challenges

via Terena.org

In what is certainly the single most fascinating and well-crafted piece on the taxonomy of organized crime in months; and it’s present and future significance for information and cyber security professionals (and non-professionals as w… Continue reading Using Similar Taxonomies To Understand Present And Future Security Challenges

Winning with Cyber Threat Intelligence: Taking a More Personal View

In this final article of our trilogy, we investigate how a cyber threat intelligence (CTI) analyst and associated programmes provide insight about physical and cyber threats to your organisation. The value of these insights is reflected in the wins, wh… Continue reading Winning with Cyber Threat Intelligence: Taking a More Personal View

OSINT – Using Threat Intelligence to Secure Your Organisation

In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge the gaps between IT, Security, and the Business. We discussed how this is beneficial to the maturity o… Continue reading OSINT – Using Threat Intelligence to Secure Your Organisation

Okta Enables Entire Organization to Participate in Cybersecurity Defense

At its Okta Showcase event, Okta launched Okta SecurityInsights to expand the base of individuals who can act on cybersecurity threats as they emerge. Joe Diamond, senior director of product marketing for Okta, said as it becomes more apparent that cy… Continue reading Okta Enables Entire Organization to Participate in Cybersecurity Defense

Threat Announcement: Phishing Sites Detected on Emoji Domains

Since September 21, PhishLabs analysts have detected a number of phishing sites hosted on emoji domains. So far, all detected sites have a few things in common:
The post Threat Announcement: Phishing Sites Detected on Emoji Domains appeared first … Continue reading Threat Announcement: Phishing Sites Detected on Emoji Domains

Reversing malware in a custom format: Hidden Bee elements

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-ste… Continue reading Reversing malware in a custom format: Hidden Bee elements

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical … Continue reading Fileless malware: getting the lowdown on this insidious threat

Exploit kits: summer 2018 review

Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.
Categories:

Exploits
Threat analysis

Tags: drive-by downloadsdrive-bysEKEKsexploit kitsgrandsoftGreenFlash S… Continue reading Exploit kits: summer 2018 review