by ThreatQ | Aug 1, 2017 | Blog, Cybersecurity
Using ThreatQ and Blueliv to Gain Greater Insights and Prioritize Threats In this day and age, almost every device is a potential target for some form of malicious attack. In this post, we will take a look at the intelligence that Blueliv Threat Intelligence Feed...
by Neal Humphrey | Jul 13, 2017 | Blog, Cybersecurity
WannaCry from the Bleachers… POSTED BY NEAL HUMPHREY Or Wanna Cry or Wanna Crypt or Wcry2 or EternalBlue with Doublepulsar, you get the idea.Update: While working on this Blog Post we have seen 2 new ransomware campaigns (Nyetya and Peytra). The amount of data so...
by Liz Bush | Jul 11, 2017 | Blog, Cybersecurity
Are You Part of the 72% that Believe Cybersecurity is Getting Harder? POSTED BY LIZ BUSH According to new research published by Enterprise Strategy Group, 72% of cybersecurity and IT professionals believe that cybersecurity analytics and operations is more difficult...
by Julian DeFronzo | Jun 14, 2017 | Blog, Cybersecurity, Threat Intelligence
One of These Things Is Not Like the Other - Defending Against Homograph Attacks POSTED BY JULIAN DEFRONZO Recently there has been an increase in homograph attacks. These attacks take advantage of certain Unicode characters that look very similar to certain ASCII...
by ThreatQ | Apr 25, 2017 | Blog, Corporate, Cybersecurity
Preparing for FS-ISAC Annual Summit: Financial Threat Actors are on the Rise POSTED BY THREATQ As the threat landscape continues to evolve, threat actors continue to target large corporations across all industries. However, in recent years there has been a clear...
by Julian DeFronzo | Mar 28, 2017 | Blog, Cybersecurity, Threat Intelligence
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks POSTED BY JULIAN DEFRONZO Part I: MongoDB Over the past few months, there has been a rise in ransomware-like attacks against many popular NoSQL databases, including MongoDB, Elasticsearch, and...