Threat Intelligence
Why Smart SOAR is the Best SOAR for iZOOlogic
The collaboration between Smart SOAR (Security Orchestration, Automation, and Response) and iZOOlogic offers a comprehensive solution to protect your brand from imposters. This integration spotlight explains how the integration between Smart SOAR ...
The-C2 Threat Intelligence Conference
A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...
Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass for Intelligent SIEM
Learn why Gurucul was named an overall leader for intelligent SIEM in the 2024 KuppingerCole I-SIEM Leadership Compass. The post Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass ...
Google Cybersecurity Action Team Threat Horizons Report #9 Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report (full version) that we just released (the official blog for ...
APT29 Espionage Attacks: Microsoft Issues Urgent Warning
In a recent announcement, Microsoft issued a warning regarding the increasing activities of APT29, a Russian state-sponsored cyber threat group. This group, notorious for its involvement in espionage attacks on Microsoft‘s systems ...
Secureworks Applies Multiple Forms of AI to Assess Threat Risks
Secureworks threat score capability leverages artificial intelligence (AI) within its Taegris extended detection and response (XDR) platform ...
SentinelOne Delivers Real-Time Managed Threat Hunting Services
SentinelOne expanded its managed threat hunting service that is now capable of continually identifying issues in real-time ...
Androxgh0st Haunts Cloud Credentials
The FBI and the U.S. CISA warned of new Androxgh0st malware that scans for and extracts application secrets ...
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part Two
It's important to establish and test out-of-band communication before you experience an attack, or 'left-of-bang.' ...
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...