Threat Intelligence

Threat Intelligence
Introduction Ransomware is an increasingly serious concern, and this problem is getting worse over time. Initially, this malware began to compromise fixed ta

June 14, 2018
Pedro Tavares
Threat Intelligence
Introduction Malware has become a critical trend for companies around the world. We are looking at ransomware and other threats already lurking around the co

May 07, 2018
Pedro Tavares
Threat Intelligence
Introduction Over the years, the diffusion of darknets has created new illegal business models. Along with classic illegal goods such as drugs and payment c

April 18, 2018
Pierluigi Paganini
Threat Intelligence
Which are the weapons in the arsenal of cybercrime gangs? Which are the most exploited vulnerabilities? To respond to these questions let's analyze the annua

March 30, 2018
Pierluigi Paganini
Threat Intelligence
It is no wonder that 2017 was a year full of surprises in the world of cybersecurity. So far in 2018, we've seen new threats appear, and relatively older one

March 21, 2018
Yassine Aboukir
Threat Intelligence
Introduction In November 2017, a group of researchers provided a macroscopic characterization of the DoS ecosystem; they shared their findings at the AMC Int

March 09, 2018
Pierluigi Paganini
Threat Intelligence
The Internet, the network or networks is huge and has the most significant data you can ever think about; it is not limited to search the people or company i

March 08, 2018
Irfan Shakeel
Threat Intelligence
Introduction Cyber-criminal activities worldwide continue to increase, in many cases, organized crime rings operate worldwide, and their profits are very hig

March 02, 2018
Pierluigi Paganini
Threat Intelligence
Cybercrime has evolved significantly in recent years. While security teams struggle to ensure businesses remain protected, cyber attacks not only increase in

February 23, 2018
Claudio Dodt
Threat Intelligence
The Year 2017 had a lot of sleepless nights for the security professional, IT admins, etc. as huge cyber-attacks marred it. Targets of those cyber-attacks we

January 19, 2018
Security NinjaIn this series
- Dark Web hacking tools: Phishing kits, exploits, DDoS for hire and more
- Dependency confusion: Compromising the supply chain
- BendyBear: A shellcode attack used for cyberespionage
- ATP group MontysThree uses MT3 toolset in industrial cyberespionage
- BlackBerry exposes threat actor group BAHAMUT: Cyberespionage, phishing and other APTs
- Top 9 cybercrime tactics, techniques and trends in 2020: A recap
- KashmirBlack botnet targets WordPress, Joomla and other popular CMS platforms
- BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group
- Linux security and APTs: Identifying threats and reducing risk
- Top 6 ransomware strains to watch out for in 2020
- 2020 Verizon data breach investigations report: Summary and key findings for security professionals
- How hackers use CAPTCHA to evade automated detection
- The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
- Dark web fraud: How-to guides make cybercrime too easy
- Top 6 malware strains to watch out for in 2020
- Top Cybersecurity Predictions for 2020
- Malware spotlight: What is click fraud?
- What does dark web monitoring really do?
- ThreatMetrix Cybercrime Report: An interview
- Are dark web monitoring services worth it?
- Cybercrime and the underground market [Updated 2019]
- Verizon DBIR 2019 analysis
- Common causes of large breaches (Q1 2019)
- The Magecart Cybercrime Group Is Threatening E-Commerce Websites Worldwide
- Russian Cyberspies Target 2018 U.S. Midterm Elections
- The Increasing Threat of Banking Trojans and Cryptojacking
- Leaders’ Meetings: A Privileged Target for Hackers
- Fraud as a Service (FaaS): Everything You Need to Know
- All about SamSam Ransomware
- The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware
- Mechanics Behind Ransomware-as-a-Service
- The Art of Fileless Malware
- ZLAB MALWARE ANALYSIS REPORT: RANSOMWARE-AS-A-SERVICE PLATFORMS
- Which Are the Most Exploited Flaws by Cybercriminal Organizations?
- 5 New Threats Every Organization Should be Prepared for in 2018
- Memcrashed: The Dangerous Trend Behind the Biggest DDoS Attack Ever
- Open source threat intelligence tools & techniques
- Global Cost of Cybercrime on the Rise
- An Enterprise Guide to Using Threat Intelligence for Cyber Defense
- The Five Largest Ransomware Attacks of 2017
- Intellectual Property Crimes in the Dark Web
- Top 5 Smartest Malware Programs
- Is Russian Intelligence Using Tainted Software to Access Corporate and Government Networks?
- Vault 7 Leaks: Inside the CIA's Secret Kingdom (July-August 07)
- DragonFly 2.0: The Alleged Nation-State Actor Hits the Energy Sector Again
- Russian APT Groups Continue Their Stealthy Operations
- Massive Petya Attack: Cybercrime or Information Warfare?
- SAP SECURITY FOR CISO: SAP Attacks and Incidents
- Role of Threat Intelligence in Business World
- WikiLeaks Vault 7 Data Leak: Another Earthquake in the Intelligence Community
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!