Tag: #Cybersecurity
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones and streaming devices to smart cars and refrigerators. This operating system has been historically less susceptiblePut Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK POSTED BY CYRILLE BADEAU We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice.Making Use of Cyber Attribution Reports
Making Use of Cyber Attribution Reports POSTED BY ROSS HAMMER Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts useLeveraging CTI to benefit organisations’ security posture
Leveraging CTI to benefit organisations’ security posture POSTED BY ANTHONY PERRIDGE One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation. Over the last year, we have seen theProtect Your Digital Life: Why Strong Passwords Matter
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was using banking apps and social media had just barely begun coming to fruition. Now, many of us are reliant on mobile banking to pay our billsWhat Financial Services Institutions Should Know About Social Media Risk
What Financial Services Institutions Should Know About Social Media Risk POSTED BY LIZ BUSH Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn,Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a flight at the airport. But this could have serious cybersecurity consequences. One popular Android app, which allowed anyone toThe “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of 2 hours and 22 minutes per day on social networking platforms. Since users are pretty reliant on social media, cybercriminals useHow to Tackle the Challenges of Threat Hunting
How to Tackle the Challenges of Threat Hunting POSTED BY LIZ BUSH In the SANS 2018 Cyber Threat Intelligence Survey, 81% of cybersecurity professionals affirm that threat intelligence is providing value and helping them do their jobsAttack Madness: The “Final Four” Cyber Threats According to Security Professionals
In the spirit of March Madness, we’re evaluating the type of cyberattacks that most concern our community of security experts. When approximately one million cyberattacks are attempted per day, this “madness” takes on a whole new level forLoad More