Threat hunting is a complex and labor-intensive task, but it can go a long way toward helping your organization detect APTs before they can cause damage to the network.
According to recent research, only 1 percent of media companies are very confident in their cybersecurity strategy and policy.
A new report revealed that 60 percent of targeted email attacks were aimed at individual contributors and lower-level management between April and June 2018.
IBM X-Force researchers unpacked ExoBot's inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.
SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.
A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.
Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.
Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
The lifecycle management of indicators is an important element to support decisions and actions against attackers. This process informs the courses of action matrix to build a response plan.
A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.