ThreatConnect Launches Retail Community for Retailers to Collaborate Around...
We have all seen the news. Home Depot. Goodwill. Michael’s and Neiman Marcus. These targeted attacks on retailers do not look like they are going to end anytime soon. Even if banks add the chip and pin...
View ArticleUsing Avalanche for Real-Time Information Sharing
Last Friday at ICS-ISAC’s Fall Conference, I participated on a panel with Aharon Chernin and Johan Rambi that discussed STIX/TAXII and Avalanche. As a recap, STIX is an emerging standard to describe...
View ArticleThreatConnect Lights Up Shellshock
You know its time to sit down and write a blog when “Grammie” calls to tell you that “someone broke the internet” and she needs you to check if her AOL account got “Shellshocked”. I guess we, like...
View ArticleDebugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs
For over a year, the ThreatConnect Intelligence Research Team (TCIRT) has been tracking Pakistan-based cyber espionage activity associated with a custom malware implant recently dubbed “BITTERBUG.” In...
View ArticleOperation SMN: From Sharing to Acting on Threat Intelligence
We at ThreatConnect are proud to be part of an industry-led Coordinated Malware Eradication (CME) initiative known as Operation SMN. The collaborative effort has targeted specific malicious...
View ArticleThreatConnect Announces Investment from Grotech Ventures
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech...
View ArticleHoliday Aspxor Mimics Retailers
The holiday season invites not only the best deals for online shopping, but it also introduces additional opportunities for email phishing, online scams, and more. We all know that you should be...
View ArticleFive Predictions for 2015 Cybersecurity
This year has been a whirlwind of very public breaches and cybersecurity headaches. From Heartbleed to Shellshock, we know the interwebs are never as secure as we think they are. Retailers, banks, and...
View ArticleOperation Poisoned Helmand
In this day and age of interconnected cloud services and distributed content delivery networks (CDNs), it is important for both CDN service providers and security professionals alike to recognize and...
View ArticleThreatConnect Industry Communities – Paying it Forward Produces Big Gains
The Pay It Forward movement is about the rippling effect that random acts of kindness have. It leverages the fact that we are wired with an innate desire to help each other, and a belief that a good...
View ArticleThreatConnect Communities: A Swiss Army Knife in Your Collaboration Arsenal
ThreatConnect Communities have become the indispensable Swiss army knife in the analyst collaboration arsenal this past year. While our community blueprint has always included – a “Common Community”...
View ArticleContext (and Quality) is King with Threat Intelligence
Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on...
View ArticleThreatConnect How To: Importing Indicators
There are many advantages to having a centralized Threat Intelligence Platform (TIP) to aggregate, analyze and act on your own threat intelligence. Among them, is empowering the threat analyst to...
View ArticleThreatConnect Community Success Story: The Rubber Meets the Road
Communities, sharing, and collaboration have hit the hype curve in cyber security circles. While the marketplace includes products that offer information exchange or are bolting on support for...
View ArticleThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including our...
View ArticleWhite House Initiative on Cyber Threat Sharing: A Good Start
Last week President Obama announced and signed an executive order to encourage companies to share their cyber threat information and launched the Cyber Threat Intelligence Integration Center (CTIIC)....
View ArticleThe Anthem Hack: All Roads Lead to China
When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented. Naturally, many...
View ArticlePremera Latest Healthcare Insurance Agency to be Breached
Similarities with Wellpoint/Anthem Event Should be Understood The recent announcement from Premera Blue Cross Blue Shield that it has fallen victim to a sophisticated cyber attack that reportedly...
View ArticleIs Your Threat Intelligence Platform Just a Tool?
“If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to conduct...
View ArticleThreat Intelligence Sharing is Real
As humans, our nature is to collaborate. We are social beings; we work together, learn from each other, help one another, and entertain. This is why threat intelligence sharing has become such a hot...
View Article