6 C
London
Monday, November 20, 2017
Home Tags Threat Intelligence

Tag: Threat Intelligence

Bots make up more than 75% of total traffic for some businesses, but one in three can't distinguish legitimate bots from malicious ones.
Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.
If hackers break in via the Domain Name System, most business wouldn't know until it's too late.

These tips can help you prepare.
Quad9 blocks malicious sites used in phishing, other nefarious activity.
The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
In a new twist to an old attack, threats actors are increasingly using the remote access protocol to install ransomware, Sophos says
Terdot Banking Trojan, inspired by Zeus, can eavesdrop and modify traffic on social media and email in addition to snatching data.
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
Deal enhances Optiv's big data, automation, and orchestration efforts.
Understanding how bad guys reuse infrastructure will show you the areas of your network to target when investigating new threats and reiteration of old malware.
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
Is it malicious? So far it's hard to tell.

For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.