by Liz Bush | Sep 11, 2018 | Blog, Cybersecurity
Spear phishing is an Equal Opportunity Threat POSTED BY LIZ BUSH Unless you’ve cut yourself off from all media over the last two years, you’re probably familiar with the hack of the Democratic National Committee (DNC) during the 2016 Presidential election. What you...
by Nir Yosha | Sep 5, 2018 | Blog, Cybersecurity, Threat Intelligence
Clustering IOCs POSTED BY NIR YOSHA There is something so absolutely freeing about staring at the stars. The milky way can be seen without a telescope. However, most stars are not visible to the naked eye. Star clusters can be discovered by their gravitational...
by Liz Bush | Aug 28, 2018 | Blog, Cybersecurity, Threat Intelligence
Mitigating Risk in the Healthcare Industry POSTED BY LIZ BUSH SingHealth. UnityPoint Health. LabCorp. Blue Springs Family Care. Sunspire. Alive Hospice. Cass Regional Medical Center. A quick Google search reveals that in the month of July alone, each of these...
by Ryan Trost | Aug 21, 2018 | Blog, Cybersecurity, Threat Intelligence
Attack Attribution POSTED BY RYAN TROST This is the third and final blog in my series on victimology. Let’s return to our previous investigation of the robertwanger [at] aol.com spear phish attacks. Now that we have a relatively decent baseline, we can start to...
by Ryan Trost | Aug 15, 2018 | Blog, Cybersecurity, Threat Intelligence
Timeline Analysis to Identify Campaign Attacks POSTED BY RYAN TROST Building from our previous spearphish investigation, let’s continue to dissect the robertwanger [at] aol.com spearphish attacks. Hypothesis – The six targeted spearphish attacks are split into...
by ThreatQ | Jul 31, 2018 | Blog, Corporate
#WheresTQRhino at Black Hat USA POSTED BY THREATQ In a few days, security professionals from all over the globe will travel to Las Vegas for what is known in the industry as “Hacker Summer Camp”: Black Hat USA and DEF CON. With last year’s event attracting a...