Zephyrnet Logo

Tag: threat intelligence

Russia-Based Turla APT Group’s Infrastructure, Activity Traceable

Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.The activities of Turla Group, a stealthy...

RSAC Micro Interviews – ExtraHop and Bandura – Corey Bodzin, Todd Weller – ESW #175

ExtraHop – Agents and logs don’t play well in an IoT environment, however the network doesn’t lie. Looking at the behaviors of...

Phishing Attacks Work Because… Humans

If the definition of insanity is repeating the same mistakes and expecting different results, then the definition of phishing is preying on human...

Design Flaws In Cyber Security Reports And Related CISO Sleep Patterns

I recently stopped using my fitness tracker, though not due to a cyber security breach or privacy concerns. Rather, it came down to...

Microsoft disrupted US-Based Infrastructure of the Necurs botnet

Microsoft announced that it took over the US-based infrastructure used by the infamous Necurs spam botnet that infected millions of computers. Microsoft announced to...

What’s Next in Cyber Threat Intelligence?

In episode 3 of our cyber threat intelligence video series, we discuss (in under 9 minutes) the future of investigation platforms, data...

How Network Metadata Can Transform Compromise Assessment

Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secretIn the 1979 cult classic When a...

What is open threat intelligence and what is driving it?

In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and...

Trustwave Fusion platform now available to enterprises in Germany

Trustwave announced the Trustwave Fusion platform, the company’s cloud-native platform that serves as the cornerstone for its products, managed security services and other...

Coronavirus, Trump threats, geopolitical campaigns – how they affect your business & what you should do

Cybereason’s Nocturnus research team published a report on how it has been tracking an APT group by the name of Molerats. Also...

Week in review: Kali Linux evolution, ransomware getting more fearsome

Here’s an overview of some of last week’s most interesting news, articles and podcasts: March 2020 Patch Tuesday forecast: Let’s put the madness behind...

Getting Past the Hype of Next Generation Endpoint Security

We’ve heard the same story for years. Antivirus software is not effective in stopping cyber-attacks, as hackers have adapted their techniques to...

Latest Intelligence

spot_img
spot_img