Why Only Phishing Simulations Are Not Enough

Why Only Phishing Simulations Are Not Enough

In the world of cybersecurity awareness, phishing simulations have long been touted as the frontline defense against cyber threats. However, while they are instrumental, relying solely on these simulations can leave significant ...

How I’m fighting cybercrime with Spamhaus (and how you can too!)

Meet Jeroen Gui - student, founder of JustGuard, and a top contributor to Spamhaus' Threat Intel Community Portal. Passionate about making the internet a safer place, Jeroen submits thousands of malicious domains, ...
15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?

15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?

Unfortunately, I am old enough to remember how SIEM was done before the arrival of threat intelligence feeds. We had to write broad behavioral (well, “behavioral-ish”, if I am totally honest) rules ...
AttackIQ Bolsters Cyber Defenses with DeepSurface's Risk-Analysis Tech

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech

This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...
Security Boulevard
vulnerability management, thrat, Jenkins CI/CD vulnerability

Taking a Threat Adapted Approach to Vulnerability Management

As cyberthreats grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week ( December 9-13, 2024) ...
Security Boulevard
Google Cloud Security Threat Horizons Report #11 Is Out!

Google Cloud Security Threat Horizons Report #11 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 (full version) that we just released (the official blog ...
Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...
NSFOCUS Included in External Threat Intelligence Service Providers Landscape Q1 2025

NSFOCUS Included in External Threat Intelligence Service Providers Landscape Q1 2025

Santa Clara, Calif. January 20, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced that it has been included in the Forrester report, The External Threat Intelligence Service Providers ...
Cybersecurity Insights with Contrast CISO David Lindner | 01/17/25

Cybersecurity Insights with Contrast CISO David Lindner | 01/17/25

Insight No. 1: HIPAA amendments: More bureaucratic BS?  Most media reports are hyping proposed HIPAA amendments, claiming they'll magically close security gaps. Yeah, right. Like forcing already overwhelmed healthcare providers to jump ...