Threat Intelligence

Threat Intelligence
Introduction At the end of April 2015, the US Government announced the first attack conducted by the Cyber Command against online activities conducted by mem

May 09, 2016
Pierluigi Paganini
Threat Intelligence
Introduction The analysis of black markets is essential to understand the evolution of phenomena in the criminal underground. The first aspect to consider wh

March 22, 2016
Pierluigi Paganini
Threat Intelligence
Malicious programs categorized as ransomware, which encrypts their victims' personal files and demands a ransom for restoring the locked data, proved to be e

March 11, 2016
David Balaban
Threat Intelligence
Introduction I was watching the Homeland series on TV when I received the news of the dramatic events in Paris. The introduction to this latest episode was e

November 17, 2015
Pierluigi Paganini
Threat Intelligence
The CISA cybersecurity bill passed U.S. Senate despite the fact that privacy advocates, private companies and civil liberties groups have expressed their dou

November 14, 2015
Pierluigi Paganini
Threat Intelligence
Current Scenario Credit card data are a precious commodity in the criminal ecosystem, the number of data breaches involving payment card data continues to in

October 23, 2015
Pierluigi Paganini
Threat Intelligence
Babacar and Casper Almost every government is working to improve its cyber-capabilities. The majority of them already have in their arsenal powerful espionag

July 08, 2015
Pierluigi Paganini
Threat Intelligence
The majority of activities related to credit card fraud are made in the underground forums and specialized hidden services in the deep web. These environme

June 16, 2015
Pierluigi Paganini
Threat Intelligence
Once upon the APT28 In October of 2014, the security firm FireEye published a report that revealed the existence of a group of Russian hackers, dubbed APT28,

June 04, 2015
Pierluigi Paganini
Threat Intelligence
Introduction to POS malware In September 2014, experts at Trustwave firm published an interesting report on the evolution of the point-of-sale (PoS) malware

April 10, 2015
Pierluigi PaganiniIn this series
- Dark Web hacking tools: Phishing kits, exploits, DDoS for hire and more
- Dependency confusion: Compromising the supply chain
- BendyBear: A shellcode attack used for cyberespionage
- ATP group MontysThree uses MT3 toolset in industrial cyberespionage
- BlackBerry exposes threat actor group BAHAMUT: Cyberespionage, phishing and other APTs
- Top 9 cybercrime tactics, techniques and trends in 2020: A recap
- KashmirBlack botnet targets WordPress, Joomla and other popular CMS platforms
- BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group
- Linux security and APTs: Identifying threats and reducing risk
- Top 6 ransomware strains to watch out for in 2020
- 2020 Verizon data breach investigations report: Summary and key findings for security professionals
- How hackers use CAPTCHA to evade automated detection
- The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
- Dark web fraud: How-to guides make cybercrime too easy
- Top 6 malware strains to watch out for in 2020
- Top Cybersecurity Predictions for 2020
- Malware spotlight: What is click fraud?
- What does dark web monitoring really do?
- ThreatMetrix Cybercrime Report: An interview
- Are dark web monitoring services worth it?
- Cybercrime and the underground market [Updated 2019]
- Verizon DBIR 2019 analysis
- Common causes of large breaches (Q1 2019)
- The Magecart Cybercrime Group Is Threatening E-Commerce Websites Worldwide
- Russian Cyberspies Target 2018 U.S. Midterm Elections
- The Increasing Threat of Banking Trojans and Cryptojacking
- Leaders’ Meetings: A Privileged Target for Hackers
- Fraud as a Service (FaaS): Everything You Need to Know
- All about SamSam Ransomware
- The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware
- Mechanics Behind Ransomware-as-a-Service
- The Art of Fileless Malware
- ZLAB MALWARE ANALYSIS REPORT: RANSOMWARE-AS-A-SERVICE PLATFORMS
- Which Are the Most Exploited Flaws by Cybercriminal Organizations?
- 5 New Threats Every Organization Should be Prepared for in 2018
- Memcrashed: The Dangerous Trend Behind the Biggest DDoS Attack Ever
- Open source threat intelligence tools & techniques
- Global Cost of Cybercrime on the Rise
- An Enterprise Guide to Using Threat Intelligence for Cyber Defense
- The Five Largest Ransomware Attacks of 2017
- Intellectual Property Crimes in the Dark Web
- Top 5 Smartest Malware Programs
- Is Russian Intelligence Using Tainted Software to Access Corporate and Government Networks?
- Vault 7 Leaks: Inside the CIA's Secret Kingdom (July-August 07)
- DragonFly 2.0: The Alleged Nation-State Actor Hits the Energy Sector Again
- Russian APT Groups Continue Their Stealthy Operations
- Massive Petya Attack: Cybercrime or Information Warfare?
- SAP SECURITY FOR CISO: SAP Attacks and Incidents
- Role of Threat Intelligence in Business World
- WikiLeaks Vault 7 Data Leak: Another Earthquake in the Intelligence Community
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!