Home Tags Indicators of Compromise (IoC)

Tag: Indicators of Compromise (IoC)

From Shamoon to StoneDrill

Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East.The malware used in...

Fileless attacks against enterprise networks

During incident response, a team of security specialists needs to follow the artefacts that attackers have left in the network.Artefacts are stored in logs,...

Bromium Secure Platform Assembles Endpoint Sensors for Enterprise Security

Bromium expands its virtualization based security isolation and detection approach into a platform play that correlates threats across a distributed network of endpoint sensors. Security...

3 Lessons From The Yahoo Breach

Your organization must address these blind spots to detect sophisticated attacks. When an organization as established and trusted as Yahoo gets breached, it seems like...

Threat Attribution: Misunderstood & Abused

Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Here's why. Threat attribution is the process of identifying actors...

HPE Details Global Security Operations Center Maturity Levels in New Report

Hewlett Packard Enterprise's 2017 State of of Security Operations Report reveals that 82 percent of Security Operation Centers are not running at the optimal...

The “EyePyramid” attacks

On January 10, 2017, a court order was declassified by the Italian police, in regards to a chain of cyberattacks directed at top Italian...

How to hunt for rare malware

At SAS 2017, on April 1st and 2nd on St. Maarten, Global Director of GReAT Costin Raiu and Principal Security Researchers Vitaly Kamluk and...

DHS-FBI Report Shows Russian Attribution's A Bear

Political and technical fallout from the DHS-FBI joint 'Grizzly Steppe' report on Russia's role in the recent election-related hacks causes more chaos than closure. A...

FBI-DHS Report Provides Insight Into Russian Malicious Cyber Activity

NEWS ANALYSIS: 'GRIZZLY STEPPE' Joint Analysis Report from Department of Homeland Security and the Federal Bureau of Investigation provides insight into the techniques allegedly...

White House fails to make case that Russian hackers tampered with...

Enlargereader comments 54 Share this story Talk about disappointments.The US government's much-anticipated analysis of Russian-sponsored hacking operations provides almost none of the...

FBI, DHS Report Implicates Cozy Bear, Fancy Bear In Election-Related Hacks

US government dubs the operation "GRIZZLY STEPPE" in new Joint Analysis Report, and says the malicious groups' activity continues. In a Joint Analysis Report (JAR)...