The interesting thing about Incident Response, and the Discipline of Digital Forensics is the need to attempt to backtrack on…
Browsing: Threat Intelligence
For some time now I [and most Security Professionals] have been very much aware that the State of Cyber Security…
Proofpoint researchers have analysed Microsoft Word Intruder (MWI), a kit designed for building malicious Microsoft Word documents for use in…
• Ten of the UK’s best amateur cyber sleuths are competing in a bid to make the UK 2016’s European…
REDWOOD CITY, CA. Anomali, provider of market-leading threat intelligence platforms, today announced the results of a Ponemon Institute study revealing…
Following the news that the Australian Red Cross blood service has been breach, Jonathan Martin, EMEA Operations Director at Anomali…
Key Takeaways On October 21, 2016, a series of distributed denial-of-service (DDoS) attacks against Dyn DNS impacted the availability of…
A cybersecurity audit of the US Secret Service found unacceptable vulnerabilities that leave the possibility of insider-threat activity and privacy…
When faced with daily reports of security breaches in global entities like SWIFT and Fortune 500 companies, and small enterprises…
ThreatConnect identifies Chinese targeting of two European drone and energy companies. Economic espionage or military intelligence? It was the best…