Scale Up Threat Hunting to Skill Up Analysts
October 8 2020Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why....
Read moreSecurity operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why....
Read moreThe US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.
Read moreNew research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.
Read moreSteganography-borne malware used to spy on industrial targets in Russia.
Read moreCybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.
Read moreResearchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.
Read moreLatest threat is one in a growing list of malware developed in the Go programming language.
Read moreAs long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Read moreSecond-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.
Read more
Recent Comments