This article has been indexed from Recorded Future This report examines trends in malware use, distribution, and development, and high-risk vulnerabilities disclosed by major hardware and software vendors between January 1 and June 30, 2021. The post H1 2021: Malware…
Category: Recorded Future
Cyber Citizenship Education is Essential
This article has been indexed from Recorded Future Lisa Guernsey and Peter W. Singer join the podcast to discuss a recent report about the challenges educators face when it comes to preparing students for the online world. The post Cyber…
Three New Ways Recorded Future and Splunk Help SecOps Teams Focus on What Matters Most
This article has been indexed from Recorded Future Recorded Future integration for Splunk has some exciting new updates, designed to drive faster, more informed security decisions. The post Three New Ways Recorded Future and Splunk Help SecOps Teams Focus on…
The Business of Fraud: SIM Swapping
This article has been indexed from Recorded Future SIM swapping involves deceiving a mobile provider (usually through social engineering) into transferring a victim’s phone number to a SIM card controlled by a cybercriminal. The post The Business of Fraud: SIM…
Action is Critical in US Cyber Policy
This article has been indexed from Recorded Future Jamil Jaffer joins the podcast to discuss his career journey on Capitol Hill and his views on the Biden admin’s cyber defense policies. The post Action is Critical in US Cyber Policy…
Third-Party Risk Management — Don’t Collaborate Without It!
This article has been indexed from Recorded Future If you’re going to enjoy the benefits of deep collaboration with third parties, then you must also accept the other side of the coin: third-party risk management The post Third-Party Risk Management…
Amid Boom in Phishing, Fraudsters Target Customers of Small and Mid-sized Banks
This article has been indexed from Recorded Future Dark web actors are increasingly advertising bank-specific phishing pages and associated services that target customers of small and mid-sized financial institutions. The post Amid Boom in Phishing, Fraudsters Target Customers of Small…
China Propaganda Network Targets BBC Media, UK in Large-Scale Influence Campaign
This article has been indexed from Recorded Future Recorded Future’s Insikt Group has discovered a large-scale, likely state-sponsored influence operation against the BBC and the UK. The post China Propaganda Network Targets BBC Media, UK in Large-Scale Influence Campaign appeared…
Establishing Cyber Rules of the Road with Russia
This article has been indexed from Recorded Future How do the United States and Russia come to an agreement on cybersecurity relations? Lauren Zabierek joins the podcast to discuss. The post Establishing Cyber Rules of the Road with Russia appeared…
Operation Secondary Infektion Continues Targeting Democratic Institutions and Regional Geopolitics
This article has been indexed from Recorded Future Operation Secondary Infektion is a longstanding information operation of likely Russian state-sponsored origin. First appearing as early as 2014, the campaign received its name from Operation Infektion, also known as Operation Denver…
Understanding Ransomware
This article has been indexed from Recorded Future Rachel Lerman from the Washington Post joins the podcast to discuss the growing global problem of ransomware attacks. The post Understanding Ransomware appeared first on Recorded Future. Read the original article: Understanding…
Protect Against BlackMatter Ransomware Before It’s Offered
This article has been indexed from Recorded Future BlackMatter, a new ransomware-as-a-service affiliate program founded in July 2021, encrypts victim’s files and appears to have been developed by a relatively sophisticated group. The post Protect Against BlackMatter Ransomware Before It’s…
Protect Against BlackMatter Ransomware Before It’s Offered
This article has been indexed from Recorded Future BlackMatter, a new ransomware-as-a-service affiliate program founded in July 2021, encrypts victim’s files and appears to have been developed by a relatively sophisticated group. The post Protect Against BlackMatter Ransomware Before It’s…
China’s Ambitions Toward Digital Colonization
This article has been indexed from Recorded Future China provides attractive, cost-effective infrastructure deals to developing nations, but at what cost is this offer made? Charity Wright joins the podcast to discuss. The post China’s Ambitions Toward Digital Colonization appeared…
“Beijing One Pass” Employee Benefits Software Exhibits Spyware Characteristics
This article has been indexed from Recorded Future During preliminary analysis, Insikt Group found that the “Beijing One Pass” PC client exhibits behaviors similar to spyware applications. The software contains built-in functionality that, taken in aggregation, raise considerable suspicions about…
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road
This article has been indexed from Recorded Future Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes…
BlackMatter Ransomware Emerges As Successor to DarkSide, REvil
This article has been indexed from Recorded Future BlackMatter is a new ransomware-as-service (RaaS) affiliate program that was founded in July 2021. According to BlackMatter, “The project has incorporated in itself the best features of DarkSide, REvil, and LockBit”. The…
You’re Not Really Ready for Ransomware
This article has been indexed from Recorded Future Is your organization truly ready for a ransomware attack? Ryan Chapman, Principal Incident Response & Forensics Consultant at BlackBerry isn’t sure most organizations are prepared. The post You’re Not Really Ready for…
The Business of Fraud: Online Retail Fraud in the Criminal Underground
This article has been indexed from Recorded Future Threat actors will continue to demonstrate flexibility, adaptability, and opportunism amid a shifting e-commerce landscape, targeting emerging retail opportunities such as curbside pickup. The post The Business of Fraud: Online Retail Fraud…
Cutting Through the Cybersecurity Noise and Chao
This article has been indexed from Recorded Future Ryan Naraine, creator and publisher of Security Conversations, joins the podcast to discuss how to bridge the gap between CISOs trying to keep their organizations safe and cutting through cybersecurity noise and…
The Four Building Blocks for Any Security Team
This article has been indexed from Recorded Future What does “back-to-basics” mean in terms of orienting a security team for operational efficiency? How do you define the basics of Security Operations? The post The Four Building Blocks for Any Security…
Threats to the 2020 Tokyo Olympic Games
This article has been indexed from Recorded Future The high profile and international nature of the Olympics makes it a target for those seeking to cause politically motivated harm, enrich themselves through criminality, or embarrass the host nation on the…
Rallying Security Intelligence With the Pride Community
This article has been indexed from Recorded Future Recorded Future’s Lea Cure and Evan Akin join the podcast to discuss the recently published report focused on the political landscape facing the LGBTQIA+ community worldwide in the last year. The post…
Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling
This article has been indexed from Recorded Future Recorded Future has identified a suspected Chinese state-sponsored group that we track as Threat Activity Group 22 (TAG-22) targeting telecommunications, academia, research and development, and government organizations in Nepal, the Philippines, Taiwan,…
How “HackMachine” Enables Fraud and Cyber Intrusions
This article has been indexed from Recorded Future The cybercriminal software “HackMachine” provides attackers with a simple-to-use and automated method of gaining access to web applications. The post How “HackMachine” Enables Fraud and Cyber Intrusions appeared first on Recorded Future.…
Additional Entities Targeted by DarkSide Affiliate, TAG-21; Links to WellMess and Sliver Infrastructure
This article has been indexed from Recorded Future A ransomware-as-a-service affiliate and its activities are tracked by Insikt Group as TAG-21 has targeted a further 11 organizations and is an affiliate of DarkSide. The post Additional Entities Targeted by DarkSide…
A Pivotal Moment for Cyber Insurance
This article has been indexed from Recorded Future Michael Phillips of cyber insurance firm Resilience joins the podcast to discuss the challenges and opportunities for cyber insurance. The post A Pivotal Moment for Cyber Insurance appeared first on Recorded Future.…
Pride and Prejudice in Shifting Landscape of LGBTQIA+ Laws Worldwide
This article has been indexed from Recorded Future In some countries, openly living as a member of the LGBTQIA+ community can be tantamount to a death sentence. But even in nations where there is broad public support for LGBTQIA+ rights…
Rage Against the HackMachine
This article has been indexed from Recorded Future There’s a versatile, easy-to-use utility being offered for sale on underground hacker forums, called HackMachine. It allows users to target victim domains and scan sites for known vulnerabilities, attempt brute force attacks,…
Threat Activity Group RedFoxtrot Linked to China’s PLA Unit 69010; Targets Bordering Asian Countries
This article has been indexed from Recorded Future Recorded Future’s Insikt Group has identified ties between a suspected Chinese state-sponsored threat activity group we track as RedFoxtrot and the Chinese military intelligence apparatus, specifically People’s Liberation Army (PLA) Unit 69010…
Risk-Based Vulnerability Intelligence Does What CVSS Can’t
This article has been indexed from Recorded Future Leveraging CVSS scores to prioritize vulnerabilities makes sense on the surface, but there are serious issues with the rating scheme as the CVSS was never meant to be used on its own…
A Nuanced Approach to Insider Threats
This article has been indexed from Recorded Future Joining us this week is Jon Ford, Managing Director of Global Government Services & Insider Threat Risk Solutions at Mandiant. Our conversation centers on his experience with effective insider threat programs, from…
The Importance of Threat Intelligence for Law Enforcement Agencies
This article has been indexed from Recorded Future Employing threat intelligence is the best way for law enforcement agencies to stay constantly aware of threats and important information. The post The Importance of Threat Intelligence for Law Enforcement Agencies appeared…
Thwarting Upstream Code Flaws From Reaching the Supply Chain
This article has been indexed from Recorded Future Lindsay Kaye, director of operational outcomes for Recorded Future’s Insikt Group joins the podcast to discuss protecting supply chains. The post Thwarting Upstream Code Flaws From Reaching the Supply Chain appeared first…
Thwarting Upstream Code Flaws From Reaching the Supply Chain
This article has been indexed from Recorded Future Lindsay Kaye, director of operational outcomes for Recorded Future’s Insikt Group joins the podcast to discuss protecting supply chains. The post Thwarting Upstream Code Flaws From Reaching the Supply Chain appeared first…
Threats to Asian Communities in North America, Europe, and Oceania
This article has been indexed from Recorded Future Asian communities in North America, Europe, and Oceania have been heavily affected by the ongoing COVID-19 pandemic, and reports of discrimination toward and violence against Asian individuals and Asian-owned businesses have increased…
Threats to Asian Communities in North America, Europe, and Oceania
This article has been indexed from Recorded Future Asian communities in North America, Europe, and Oceania have been heavily affected by the ongoing COVID-19 pandemic, and reports of discrimination toward and violence against Asian individuals and Asian-owned businesses have increased…
The DOD’s SWAT Team of Nerds
This article has been indexed from Recorded Future Jack Cable joins the podcast to discuss his past, his reputation as a hacker, and his experience helping run the Hack the Pentagon portfolio. The post The DOD’s SWAT Team of Nerds…
Disrupting Adversary Behavior with Recorded Future and MITRE ATT&CK
This article has been indexed from Recorded Future The MITRE ATT&CK Framework provides immense value between the strategic and operational levels of security intelligence. The best way to use the framework is to incorporate it as a central part of…
Who is DarkSide—The Group Behind the Colonial Pipeline Breach?
This article has been indexed from Recorded Future The DarkSide ransomware group has made the news in 2021 due to its high-value targets such as the Colonial Pipeline and high ransom amounts. It is considered to be one of the…
The Challenges and Solutions of Cybersecurity Policy Decisions Today
This article has been indexed from Recorded Future Niloo Razi Howe discusses the challenges of ransomware and attribution, as well as her outlook for possible solutions to these challenges. The post The Challenges and Solutions of Cybersecurity Policy Decisions Today…
The Business of Fraud: Dating Fraud in the Criminal Underground
This article has been indexed from Recorded Future Dating fraud or dating scams are a form of social engineering in which threat actors feign romantic interest in a target to lure them into a false sense of security, allowing the…
Unpacking the Emotet Takedown
This article has been indexed from Recorded Future In January of 2021 an international effort led by Europol took control of Emotet infrastructure, effectively taking it down. The post Unpacking the Emotet Takedown appeared first on Recorded Future. Read the…
Unpacking the Emotet Takedown
This article has been indexed from Recorded Future In January of 2021 an international effort led by Europol took control of Emotet infrastructure, effectively taking it down. The post Unpacking the Emotet Takedown appeared first on Recorded Future. Read the…
Why Monitoring the Dark Web is Essential for Third-Party Risk Management
This article has been indexed from Recorded Future Third-party risk management teams need to assess all of the threats that their organization may be exposed to through a breach on a third-party. Many of these breaches occur on the dark…
The Business of Fraud: Drops and Mules
This article has been indexed from Recorded Future Mules, individuals who transfer money or goods on the behalf of others, are a crucial component to the success of financial crimes. The post The Business of Fraud: Drops and Mules appeared…
The Business of Fraud: Drops and Mules
Mules, individuals who transfer money or goods on the behalf of others, are a crucial component to the success of financial crimes. The post The Business of Fraud: Drops and Mules appeared first on Recorded Future. Read the original article:…
Bringing Tools of National Power to Fight Ransomware
Philip Reiner, CEO at The Institute for Security and Technology joins the podcast to discuss a recent report published by the institute that discusses combating ransomware. The post Bringing Tools of National Power to Fight Ransomware appeared first on Recorded…
China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation
A branch of the PLA has sought to purchase antivirus software from several major American, European, and Russian security companies. The post China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation appeared first on Recorded Future. Read the…
Navigating the Travel Industry with Threat Intelligence
Director of Cyber Treat Intelligence at Expedia Group, Collin Barry joins the podcast to talk about protecting online travel. The post Navigating the Travel Industry with Threat Intelligence appeared first on Recorded Future. Read the original article: Navigating the Travel…
China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation
A branch of the PLA has sought to purchase antivirus software from several major American, European, and Russian security companies. The post China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation appeared first on Recorded Future. Read the…
Navigating the Travel Industry with Threat Intelligence
Read the original article: Navigating the Travel Industry with Threat Intelligence Director of Cyber Treat Intelligence at Expedia Group, Collin Barry joins the podcast to talk about protecting online travel. The post Navigating the Travel Industry with Threat Intelligence appeared…
Breached Online Ordering Platforms Expose Dozens of Restaurants
Read the original article: Breached Online Ordering Platforms Expose Dozens of Restaurants Cybercriminals have begun targeting restaurant service companies and in turn exposed over 300,000 payment cards from 70 restaurants. The post Breached Online Ordering Platforms Expose Dozens of Restaurants…
The Business of Fraud: Deepfakes, Fraud’s Next Frontier
Read the original article: The Business of Fraud: Deepfakes, Fraud’s Next Frontier Threat actors have begun to use dark web sources to offer customized services and tutorials that incorporate visual and audio deepfake technologies designed to bypass and defeat security…
Stay Ahead of Global Uncertainty With Real-time Geopolitical Intelligence for Esri
Read the original article: Stay Ahead of Global Uncertainty With Real-time Geopolitical Intelligence for Esri To monitor and respond to geopolitical threats in real time, teams need a more efficient and collaborative way to report on relevant insights that drive…
Malware Party Tricks and Cybersecurity Trends
Read the original article: Malware Party Tricks and Cybersecurity Trends Hall of Famer Graham Cluley joins the podcast to swap old war stories about fighting malware back in the early internet days, how things have changed, and what the future…
Security Intelligence Handbook Chapter 12: Security Intelligence Helps CISOs Communicate IT Risks to the C-Suite
Read the original article: Security Intelligence Handbook Chapter 12: Security Intelligence Helps CISOs Communicate IT Risks to the C-Suite CISOs are a key organization protector and hold the entire weight of an organization’s data security in their hands. The post…
Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020
Read the original article: Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020 The MABNA Institute, an Iranian group, continued its global operations against academic and research sector institutions throughout 2020. The post Iran-Linked Threat Actor The MABNA Institute’s Operations…
Protecting Journalists Online
Read the original article: Protecting Journalists Online Anjuli Shere joins the podcast to discuss the ongoing threats against journalists and organizations and how she is creating a framework to improve the protection of their staff against threats. The post Protecting…
Simplify and Accelerate Threat Hunting with High-Speed, High-Confidence Threat Intelligence
Read the original article: Simplify and Accelerate Threat Hunting with High-Speed, High-Confidence Threat Intelligence Our Threat Intelligence module pairs high-speed, large-scale collection and automated link analysis to produce high-confidence indicator linkages. The post Simplify and Accelerate Threat Hunting with High-Speed,…
How Contextualized Intelligence Maximizes Security Outcomes in SecOps Tools
Read the original article: How Contextualized Intelligence Maximizes Security Outcomes in SecOps Tools To effectively respond to all of the alerts in a day, security operations teams need to prioritize so they can maximize their efforts. The post How Contextualized…
Powering Enterprise Security with End-to-End Threat Visibility
Read the original article: Powering Enterprise Security with End-to-End Threat Visibility New capabilities for our Threat Intelligence and SecOps Intelligence solutions arm clients with real-time, high-confidence intelligence for faster identifications and triage of security concerns. The post Powering Enterprise Security…
The Inner Workings of Financially Motivated Cybercrime
Read the original article: The Inner Workings of Financially Motivated Cybercrime Roman Sannikov and Kirill Boychenko join the podcast to describe types of fraud methods and services currently used by threat actors. The post The Inner Workings of Financially Motivated…
Lockdown Saw Rise in Wine Domains and Wine Scammers
Read the original article: Lockdown Saw Rise in Wine Domains and Wine Scammers COVID-19 lockdowns led to a boom in virtual happy hours, and scammers weren’t far behind as we found a rise in malicious wine domains too. The post…
Cybercriminals Continue to Exploit Human Nature Through Phishing and Spam Attacks
Read the original article: Cybercriminals Continue to Exploit Human Nature Through Phishing and Spam Attacks Developers of phishing and spamming tools are creating kits and offering services that are customizable and automated. The post Cybercriminals Continue to Exploit Human Nature…
Streamlining Third-Party Risk Management
Read the original article: Streamlining Third-Party Risk Management Madiha Fatima discusses how to create an effective due diligence process, integrating automation, and process efficiencies for third party risk management. The post Streamlining Third-Party Risk Management appeared first on Recorded Future.…
Streamlining Third Party Risk Management
Read the original article: Streamlining Third Party Risk Management Madiha Fatima discusses how to create an effective due diligence process, integrating automation, and process efficiencies for third party risk management. The post Streamlining Third Party Risk Management appeared first on…
The Business of Fraud: Fraud Tutorials and Courses
Read the original article: The Business of Fraud: Fraud Tutorials and Courses Training tutorials and courses sustain the activities of various underground forums and threat actors. See real examples of these courses. The post The Business of Fraud: Fraud Tutorials…
Security Intelligence Handbook Chapter 11: Geopolitical Intelligence Identifies IT Risks Across the Globe
Read the original article: Security Intelligence Handbook Chapter 11: Geopolitical Intelligence Identifies IT Risks Across the Globe Nation-state threat actors are out to cause maximum damage and disruption, which has led to more critical infrastructure attacks. An excerpt from the…
Ransomware and Extortion Evolve More Brazen Tactics
Read the original article: Ransomware and Extortion Evolve More Brazen Tactics Allan Liska comes on the podcast to update us on the latest trends he is tracking on the ransomware and online extortion fronts. The post Ransomware and Extortion Evolve…
Suspected Chinese Group Calypso APT Exploiting Vulnerable Microsoft Exchange Servers
Read the original article: Suspected Chinese Group Calypso APT Exploiting Vulnerable Microsoft Exchange Servers Suspected Chinese Group Calypso APT is believed to be exploiting the recently disclosed Microsoft Exchange vulnerabilities. The post Suspected Chinese Group Calypso APT Exploiting Vulnerable Microsoft…
Myanmar Coup and Internet Censorship Pushes Civilians to Underground Forums, Dark Web
Read the original article: Myanmar Coup and Internet Censorship Pushes Civilians to Underground Forums, Dark Web Burmese citizens have begun turning to alternative media sources and downloading tools to bypass censorship in the country. The post Myanmar Coup and Internet…
Reducing Risk For the Modern Supply Chain With Third-Party Intelligence
Read the original article: Reducing Risk For the Modern Supply Chain With Third-Party Intelligence Our Third-Party Intelligence module is specifically created for the GRC team, providing key risk indicators that help to monitor any risk. The post Reducing Risk For…
An Internet Born In a Threat-Free Environment
Read the original article: An Internet Born In a Threat-Free Environment Paul Vixie, CEO and co-founder of Farsight Security, shares his insights on why he believes it’s best not to rely on outsourcing your DNS. The post An Internet Born…
Insider Trading Threats on Dark Web and Underground Sources
Read the original article: Insider Trading Threats on Dark Web and Underground Sources Insikt Group explores how insider trading can be carried out more easily now than ever before with the dark web and underground communities. The post Insider Trading…
China-linked TA428 Continues to Target Russia and Mongolia IT Companies
Read the original article: China-linked TA428 Continues to Target Russia and Mongolia IT Companies Recorded Future’s Insikt Group identified activity attributed to the suspected Chinese threat activity group TA428. The post China-linked TA428 Continues to Target Russia and Mongolia IT…
The Journey Ahead is the Challenge in ICS
Read the original article: The Journey Ahead is the Challenge in ICS On the occasion of this, our 200th episode of the Recorded Future podcast, we welcome back our very first guest, Robert M. Lee, CEO of industrial control systems…
Understanding Accellion’s FTA Appliance Compromise, DEWMODE, and Its Supply Chain Impact
Read the original article: Understanding Accellion’s FTA Appliance Compromise, DEWMODE, and Its Supply Chain Impact This report provides a high-level overview of the Accellion File Transfer Appliance compromise and analysis of the DEWMODE webshell employed. The post Understanding Accellion’s FTA…
IBM Security and Recorded Future: Better Together
Read the original article: IBM Security and Recorded Future: Better Together Recorded Future delivers more context than threat feeds, updates in real time for relevant intelligence and integrates with IBM Security SOAR. The post IBM Security and Recorded Future: Better…
Using Intelligence to Prioritize AWS Guard Duty Alerts
Read the original article: Using Intelligence to Prioritize AWS Guard Duty Alerts Explore how Recorded Future Express paired with AWS GuardDuty can speed up your threat detection, investigation, and response to threats. The post Using Intelligence to Prioritize AWS Guard…
Introduction to Sigma Rules and Detection of Credential Harvesting
Read the original article: Introduction to Sigma Rules and Detection of Credential Harvesting This report details Insikt Group’s research regarding Sigma based detection rules for Mimikatz, LaZagne, T-Rat 2.0, and Osno Stealer. The post Introduction to Sigma Rules and Detection…
A Call to Arms In Favor of Rationality
Read the original article: A Call to Arms In Favor of Rationality Sir David Omand, former director of @GCHQ discusses his career in intelligence and public service, and the changes he’s seen along the way. The post A Call to…
Myanmar Democracy Under Fire: Military Coup Commands International Attention
Read the original article: Myanmar Democracy Under Fire: Military Coup Commands International Attention Recorded Future is analyzing the evolving situation in Myanmar and the impact that martial law is having on the cyber landscape. The post Myanmar Democracy Under Fire:…
Security Intelligence Handbook Chapter 10: A Different Kind of Brand Protection
Read the original article: Security Intelligence Handbook Chapter 10: A Different Kind of Brand Protection Brand intelligence harnesses automation, analytics, and human expertise to map, monitor, and score events related to brand risk. The post Security Intelligence Handbook Chapter 10:…
Cyber Threats to the Black Community
Read the original article: Cyber Threats to the Black Community To honor Black History Month, Insikt Group conducted research into cyber threats that are facing the Black community within the United States. The post Cyber Threats to the Black Community…
Leaders Make Good News Out of Bad
Read the original article: Leaders Make Good News Out of Bad Two CEOs from leading companies in the cybersecurity industry join the podcast to share what it’s like as a CEO in a rapidly changing field. The post Leaders Make…
China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions
Read the original article: China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions Insikt Group has revealed details of a cyber campaign conducted by a China-linked group, named RedEcho, targeting India’s power sector. The post China-linked Group…
The Business of Fraud: An Overview of How Cybercrime Gets Monetized
Read the original article: The Business of Fraud: An Overview of How Cybercrime Gets Monetized In this report, Insikt Group describes 11 types of fraud methods and services currently used by threat actors to facilitate their campaigns. The post The…
Announcing Security Intelligence for Splunk — For Free
Read the original article: Announcing Security Intelligence for Splunk — For Free Our free 30-day trial of our integration for Splunk Enterprise and ES — this offers Splunk users access to our real-time SecOps intelligence. The post Announcing Security Intelligence…
Deepfakes as a Service
Read the original article: Deepfakes as a Service Andrei Barysevich, co-founder and CEO of fraud intelligence firm Gemini Advisory, shares how organizations can best defend against deepfakes. The post Deepfakes as a Service appeared first on Recorded Future. Become…
Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time
Read the original article: Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time Learn how our third party intelligence solution can help you reduce your organization’s overall risk of data breaches and reputational damage. The post Security Intelligence…
Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time
Read the original article: Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time Learn how our third party intelligence solution can help you reduce your organization’s overall risk of data breaches and reputational damage. The post Security Intelligence…
A Secure Environment Where People Can Be Their Whole Selves
Read the original article: A Secure Environment Where People Can Be Their Whole Selves Simon Hodgkinson, security professional with over 35 years of experience and CISO at BP, discusses the evolution of the cybersecurity space. The post A Secure Environment…
The Symbiotic Relationship Between Brand Intelligence and Brand Trust
Read the original article: The Symbiotic Relationship Between Brand Intelligence and Brand Trust Deirdre Bigley, CMO of Bloomberg, talks about the critical role of cybersecurity in protecting and maintaining brand trust in this interview. The post The Symbiotic Relationship Between…
Q42020 Malware Trends: Year Punctuated by Ransomware and Data Breaches Concludes With Sophisticated SolarWinds Attack
Read the original article: Q42020 Malware Trends: Year Punctuated by Ransomware and Data Breaches Concludes With Sophisticated SolarWinds Attack Insikt Group reflects on Q4’s malware trends — a year punctuated by ransomware and data breaches that concluded with the SolarWinds…
Top Exploited Vulnerabilities in 2020 Affect Citrix, Microsoft Products
Read the original article: Top Exploited Vulnerabilities in 2020 Affect Citrix, Microsoft Products This report highlights 2020’s most weaponized vulnerabilities based on exploitation across all industries and with multiple types malware. The post Top Exploited Vulnerabilities in 2020 Affect Citrix,…
Unraveling Disinformation in Social Media
Read the original article: Unraveling Disinformation in Social Media Jane Lytvynenko, senior reporter at Buzzfeed News, comes on the podcast to share her insights on misinformation and disinformation. The post Unraveling Disinformation in Social Media appeared first on Recorded Future.…
Indonesia and China Face Off Over Increasing Maritime Intrusions
Read the original article: Indonesia and China Face Off Over Increasing Maritime Intrusions Indonesia is facing naval challenges in its offshore territories as China and other countries move south and explore and exploit the waters. The post Indonesia and China…
Top 6 MITRE ATT&CK Techniques Identified in 2020, Defense Evasion Tactics Prevail
Read the original article: Top 6 MITRE ATT&CK Techniques Identified in 2020, Defense Evasion Tactics Prevail This report covers a landscape of tactics and techniques tagged in our platform data sources as mapped to the MITRE ATT&CK framework in 2020.…
Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis
Read the original article: Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis Explore how specific loss probabilities empower organizations to strike the right balance between protecting and running the business. The post Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis…