by Liz Bush | Aug 28, 2018 | Blog, Cybersecurity, Threat Intelligence
Mitigating Risk in the Healthcare Industry POSTED BY LIZ BUSH SingHealth. UnityPoint Health. LabCorp. Blue Springs Family Care. Sunspire. Alive Hospice. Cass Regional Medical Center. A quick Google search reveals that in the month of July alone, each of these...
by Marc Solomon | Aug 23, 2018 | Media Coverage
Flintstones Chewable Vitamins were among the first multivitamins for kids, and when I was growing up they were all the rage. Today, many adults continue the practice of taking a multivitamin. To get a dietary supplement more tailored to our needs we can choose a...
by Ryan Trost | Aug 21, 2018 | Blog, Cybersecurity, Threat Intelligence
Attack Attribution POSTED BY RYAN TROST This is the third and final blog in my series on victimology. Let’s return to our previous investigation of the robertwanger [at] aol.com spear phish attacks. Now that we have a relatively decent baseline, we can start to...
by ThreatQ | Aug 20, 2018 | Media Coverage
During the week of Black Hat and Defcon, tens of thousands of security experts and hackers flock to Las Vegas for the back-to-back conferences. They hold discussions on issues like smart cities getting hacked, two-factor authentication, and security issues with voice...
by Ryan Trost | Aug 15, 2018 | Blog, Cybersecurity, Threat Intelligence
Timeline Analysis to Identify Campaign Attacks POSTED BY RYAN TROST Building from our previous spearphish investigation, let’s continue to dissect the robertwanger [at] aol.com spearphish attacks. Hypothesis – The six targeted spearphish attacks are split into...