Threat Intelligence

Threat Intelligence
Technology is invading our lives. Every day we perform a multitude of operations using computing devices; we check out bank account balance, we pay parking a

August 30, 2019
Pierluigi Paganini
Threat Intelligence
Introduction The Verizon Data Breach Investigations Report (DBIR) is now an annual festival of cybersecurity analysis. The 2019 report used data from 41,686

July 23, 2019
Susan Morrow
Threat Intelligence
Introduction: What’s to be done about data breaches? With the new focus on digital privacy and data privacy regulations, data breaches are increasingly in t

May 01, 2019
Howard Poston
Threat Intelligence
Introduction In recent weeks, the Magecart cybercrime group has conducted a number of successful attacks against e-commerce websites worldwide. The group sp

October 31, 2018
Pierluigi Paganini
Threat Intelligence
APT28 Behind Cyberattacks In July, Microsoft announced that Russia-linked threat actors attempted to hack at least three 2018 U.S. midterm election candidate

August 28, 2018
Pierluigi Paganini
Threat Intelligence
Blockchain is one of the hottest and potentially among the most disruptive technologies today. So naturally, it's a magnet for the criminal element, w

August 17, 2018
Rodika Tollefson
Threat Intelligence
Leaders' meetings are privileged targets for nation-state attackers that launch massive offensives to gather intelligence from the ongoing events. Let's anal

July 31, 2018
Pierluigi Paganini
Threat Intelligence
Introduction The 2017 LexisNexis® True Cost of Fraud report makes for sobering reading. After surveying nearly 1,200 risk and fraud executives, the report co

July 26, 2018
Penny Hoelscher
Threat Intelligence
Ransomware: Perhaps Today's No.1 Security Threat Threatening and Risky for you and fruitful for hackers, ransomware has taken over as today's no. 1 security

July 03, 2018
Sayaala
Threat Intelligence
1. Introduction ISACA, an international association focused on IT governance, has recently released its annual study "State of Cybersecurity." The study rela

June 14, 2018
Daniel DimovIn this series
- Dark Web hacking tools: Phishing kits, exploits, DDoS for hire and more
- Dependency confusion: Compromising the supply chain
- BendyBear: A shellcode attack used for cyberespionage
- ATP group MontysThree uses MT3 toolset in industrial cyberespionage
- BlackBerry exposes threat actor group BAHAMUT: Cyberespionage, phishing and other APTs
- Top 9 cybercrime tactics, techniques and trends in 2020: A recap
- KashmirBlack botnet targets WordPress, Joomla and other popular CMS platforms
- BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group
- Linux security and APTs: Identifying threats and reducing risk
- Top 6 ransomware strains to watch out for in 2020
- 2020 Verizon data breach investigations report: Summary and key findings for security professionals
- How hackers use CAPTCHA to evade automated detection
- The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
- Dark web fraud: How-to guides make cybercrime too easy
- Top 6 malware strains to watch out for in 2020
- Top Cybersecurity Predictions for 2020
- Malware spotlight: What is click fraud?
- What does dark web monitoring really do?
- ThreatMetrix Cybercrime Report: An interview
- Are dark web monitoring services worth it?
- Cybercrime and the underground market [Updated 2019]
- Verizon DBIR 2019 analysis
- Common causes of large breaches (Q1 2019)
- The Magecart Cybercrime Group Is Threatening E-Commerce Websites Worldwide
- Russian Cyberspies Target 2018 U.S. Midterm Elections
- The Increasing Threat of Banking Trojans and Cryptojacking
- Leaders’ Meetings: A Privileged Target for Hackers
- Fraud as a Service (FaaS): Everything You Need to Know
- All about SamSam Ransomware
- The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware
- Mechanics Behind Ransomware-as-a-Service
- The Art of Fileless Malware
- ZLAB MALWARE ANALYSIS REPORT: RANSOMWARE-AS-A-SERVICE PLATFORMS
- Which Are the Most Exploited Flaws by Cybercriminal Organizations?
- 5 New Threats Every Organization Should be Prepared for in 2018
- Memcrashed: The Dangerous Trend Behind the Biggest DDoS Attack Ever
- Open source threat intelligence tools & techniques
- Global Cost of Cybercrime on the Rise
- An Enterprise Guide to Using Threat Intelligence for Cyber Defense
- The Five Largest Ransomware Attacks of 2017
- Intellectual Property Crimes in the Dark Web
- Top 5 Smartest Malware Programs
- Is Russian Intelligence Using Tainted Software to Access Corporate and Government Networks?
- Vault 7 Leaks: Inside the CIA's Secret Kingdom (July-August 07)
- DragonFly 2.0: The Alleged Nation-State Actor Hits the Energy Sector Again
- Russian APT Groups Continue Their Stealthy Operations
- Massive Petya Attack: Cybercrime or Information Warfare?
- SAP SECURITY FOR CISO: SAP Attacks and Incidents
- Role of Threat Intelligence in Business World
- WikiLeaks Vault 7 Data Leak: Another Earthquake in the Intelligence Community
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!