by Anthony Stitt | Oct 24, 2018 | Blog, Cybersecurity, Threat Intelligence
How To Close Security Gaps With A Threat Intelligence Library POSTED BY ANTHONY STITT Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time, these technologies have increasingly...
by Steve Rivers | Oct 9, 2018 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting Using ThreatQ and MITRE ATT&CK POSTED BY STEVE RIVERS AND NIR YOSHA The reality is that breaches happen. The key is responding to them quickly and effectively. Many businesses are very reactive when responding to threats. It is, however, possible to...
by Liz Bush | Sep 18, 2018 | Blog, Cybersecurity, Threat Intelligence
The Top 5 Cyberthreats to the Retail Industry and How to Prevent Them POSTED BY LIZ BUSH Macy’s, Adidas, Panera Bread and Chili’s are just a few of the retailers and merchants who have fallen victim to cyberattacks in the last few months, putting payment card data and...
by Nir Yosha | Sep 5, 2018 | Blog, Cybersecurity, Threat Intelligence
Clustering IOCs POSTED BY NIR YOSHA There is something so absolutely freeing about staring at the stars. The milky way can be seen without a telescope. However, most stars are not visible to the naked eye. Star clusters can be discovered by their gravitational...
by Liz Bush | Aug 28, 2018 | Blog, Cybersecurity, Threat Intelligence
Mitigating Risk in the Healthcare Industry POSTED BY LIZ BUSH SingHealth. UnityPoint Health. LabCorp. Blue Springs Family Care. Sunspire. Alive Hospice. Cass Regional Medical Center. A quick Google search reveals that in the month of July alone, each of these...
by Ryan Trost | Aug 21, 2018 | Blog, Cybersecurity, Threat Intelligence
Attack Attribution POSTED BY RYAN TROST This is the third and final blog in my series on victimology. Let’s return to our previous investigation of the robertwanger [at] aol.com spear phish attacks. Now that we have a relatively decent baseline, we can start to...