threat intelligence
50% of cybersecurity attacks are from repeat offenders
Lack of awareness and gaps in knowledge are a weak link for cybersecurity leadership who are responsible for strategic planning of cybersecurity defenses, leaving …
Physical threats increase as employees return to the office
As COVID-19 vaccinations continue, companies embrace hybrid work, employees return to the office and the U.S. opens up, violence and physical threats to businesses are …
Cyber insurance failing to live up to expectations
A RUSI paper finds that the contribution of the insurance sector to improving cyber security practice is ‘more limited than policymakers and businesses might hope’, and …
XDR: Security’s new frontier
As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …
Zero day malware reached an all-time high of 74% in Q1 2021
74% of threats detected in Q1 2021 were zero day malware – or those for which a signature-based antivirus solution did not detect at the time of the malware release – capable …
New tool allows organizations to customize their ATT&CK database
MITRE Engenuity has released ATT&CK Workbench, an open source tool that allows organizations to customize their local instance of the MITRE ATT&CK database of cyber …
Digital criminals turn toward vaccines to capitalize on COVID-19
Cybercriminals continue to capitalize on the hysteria and worry caused by COVID-19, both in the physical sphere and digital ecosystem, exploiting the significant global unmet …
Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK
CISA has partnered with the Homeland Security Systems Engineering and Development Institute (HSSEDI), which worked with the MITRE ATT&CK team, to issue guidance to help …
What happens after a malicious email reaches employees’ inboxes?
On average, it takes three and half days (83 hours) from the moment a malicious email attack lands in an employees inbox, to when it is discovered by a security team or …
Threat intelligence: The biggest blind spot for CISOs
More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey also found …
3.4 billion credential stuffing attacks hit financial services organizations
Akamai published a report that provides an analysis of both global and financial services-specific web application and credential stuffing attack traffic, revealing …
How prepared is the intelligence community to tackle possible threats?
Human psychology is complex. It’s a dynamic and sometimes contradictory system. Compounding this problem is the rapid progress of technology and social media, toppling …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks