Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

US broadband and networking semiconductor maker MaxLinear this week revealed that some of its operational systems were infected with Maze ransomware. [Read More]
A specialized CIA unit that developed hacking tools and cyber weapons didn’t do enough to protect its own operations and wasn't prepared to respond when its secrets were exposed, according to an internal report. [Read More]
T-Mobile on Monday suffered a major outage in the United States and it ended up being reported as a “massive” DDoS attack. [Read More]
United States House representatives last week sent a letter to Zoom to demand explanation for the communication platform’s decision to close the accounts of U.S.-based Chinese activists. [Read More]
Australian beverages giant Lion says its systems have been infected with a piece of ransomware that disrupted manufacturing processes and customer service. [Read More]
A city in northern Alabama will pay a ransom worth $300,000 in Bitcoins in response to a hack of its computer system. [Read More]
Twitter on Friday announced that it took down more than 30,000 accounts pertaining to three networks associated with China, Turkey, and Russia state-linked manipulation activities. [Read More]
Authorities are investigating interference with police radio communications, websites and networks used by law enforcement and other officials during recent U.S. protests over the death of George Floyd in Minneapolis. [Read More]
Honda Motor said that it has been hit by a cyberattack that disrupted its business in several countries, though it expects the overall impact to be contained. [Read More]
An unprotected AWS S3 bucket exposed the data of 2,700 users who signed up for the Joomla Resources Directory. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
Threat intelligence value comes down to relevance and accessibility, which requires curation into a customized enrichment source, aggregating data filtered by a range of factors.
Craig Harber's picture
No matter how many best-of-breed protective solutions you use to defend your network, the unfortunate reality is eventually an attacker is going to get past them.
Marc Solomon's picture
Security teams need the ability to understand threats, hunt for threats and use automation effectively and responsibly.
Joshua Goldfarb's picture
When the security of our organization depends on us leaving our comfort zone, how can we ensure that we accomplish what we set out to do without putting the organization at additional risk?
Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Marc Solomon's picture
Five things you should know about incident pruning and how to apply it to improve investigations, threat hunting and incident response.
Josh Lefkowitz's picture
A use case-centric approach to threat intelligence can yield substantial benefits and is absolutely worth pursuing. It just needs to be pursued properly.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.