The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.
To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
Cloud gaming service Steam pulled a game from its library on July 30 after users reported that it was actually a cryptojacking scam.
Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.
There's a significant divide between perceptions of SOC technology, talent and other key operations issues among analysts, directors and executives, according to the findings of a recent report.
Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection.
As cloud adoption increases, the IT skills gap widens and the threat landscape becomes more sophisticated, innovations in SIEM technology will revolutionize the way SOCs perform security analytics.
Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.