Threat Intelligence

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Why Only Phishing Simulations Are Not Enough
Mike Polatsek | | Awareness Training, Compliance, cyber attacks, phishing awareness training, Phishing Simulation Plaform, Phishing Statistics, Security Culture, Security Metrics, Security Training ROI, Threat Intelligence
In the world of cybersecurity awareness, phishing simulations have long been touted as the frontline defense against cyber threats. However, while they are instrumental, relying solely on these simulations can leave significant ...
How I’m fighting cybercrime with Spamhaus (and how you can too!)
Meet Jeroen Gui - student, founder of JustGuard, and a top contributor to Spamhaus' Threat Intel Community Portal. Passionate about making the internet a safer place, Jeroen submits thousands of malicious domains, ...

15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?
Unfortunately, I am old enough to remember how SIEM was done before the arrival of threat intelligence feeds. We had to write broad behavioral (well, “behavioral-ish”, if I am totally honest) rules ...

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech
This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...
Security Boulevard

Taking a Threat Adapted Approach to Vulnerability Management
As cyberthreats grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week ( December 9-13, 2024) ...
Security Boulevard

Google Cloud Security Threat Horizons Report #11 Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 (full version) that we just released (the official blog ...

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

NSFOCUS Included in External Threat Intelligence Service Providers Landscape Q1 2025
NSFOCUS | | Forrester, Forrester report, NTI, Press Releases, The External Threat Intelligence Service Providers Landscape, Threat Intelligence
Santa Clara, Calif. January 20, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced that it has been included in the Forrester report, The External Threat Intelligence Service Providers ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/17/25
David Lindner, Director, Application Security | | Application Detection and Response (ADR), CFO, CISO, CISO Insights, Cybersecurity ROI, Data breach, encryption, healthcare cybersecurity, HIPAA, HIPAA Amendments, MFA, Multifactor Authentication, Threat Intelligence
Insight No. 1: HIPAA amendments: More bureaucratic BS? Most media reports are hyping proposed HIPAA amendments, claiming they'll magically close security gaps. Yeah, right. Like forcing already overwhelmed healthcare providers to jump ...