by Liz Bush | Aug 28, 2019 | Blog, Cybersecurity, Threat Intelligence
Combating TRISIS with the MITRE ATT&CK Framework POSTED BY LIZ BUSH TRISIS malware was first discovered in August 2017 on an industrial control system at an oil refinery in Saudi Arabia. Multinational energy company, Schneider Electric, was shut down by particularly...
by Yann LeBorgne | Aug 20, 2019 | Blog, Cybersecurity
Victimology: in the shoes of a cybersecurity analyst POSTED BY YANN LE BORGNE A recent report from the government showed that 32% of businesses identified a cyber security attack in the last 12 months, and one of the most common attacks is spear-phishing – which...
by Liz Bush | Aug 2, 2019 | Blog, Cybersecurity
What’s Top of Mind for Black Hat Attendees, and How We Can Help POSTED BY LIZ BUSH In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who...
by Liz Bush | Jul 30, 2019 | Blog, Cybersecurity, Threat Intelligence
An Up-Close Look at How to Increase Threat Hunting Efficiency POSTED BY LIZ BUSH Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic. Security teams engage in threat hunting when they...
by Haig Colter | Jul 23, 2019 | Blog, Cybersecurity
ThreatQuotient recognized for 4th consecutive year on CRN’s Emerging Vendors List POSTED BY HAIG COLTER I’m very pleased to share the news that for the fourth consecutive year ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new,...
by ThreatQ | Jul 18, 2019 | Blog
Real-Time Phishing Threat Intelligence from SlashNext now integrated with ThreatQ Today’s phishing and social engineering threats move faster and employ more evasion tactics than ever. The initial goal? To bypass multi-layer defenses, including the last ditch “human...