Quantcast
Channel: ThreatConnect - Threat Intelligence
Browsing all 32 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ThreatConnect Launches Retail Community for Retailers to Collaborate Around...

We have all seen the news. Home Depot. Goodwill. Michael’s and Neiman Marcus. These targeted attacks on retailers do not look like they are going to end anytime soon. Even if banks add the chip and pin...

View Article


Using Avalanche for Real-Time Information Sharing

Last Friday at ICS-ISAC’s Fall Conference, I participated on a panel with Aharon Chernin and Johan Rambi that discussed STIX/TAXII and Avalanche.  As a recap, STIX is an emerging standard to describe...

View Article


Image may be NSFW.
Clik here to view.

ThreatConnect Lights Up Shellshock

You know its time to sit down and write a blog when “Grammie” calls to tell you that “someone broke the internet” and she needs you to check if her AOL account got “Shellshocked”. I guess we, like...

View Article

Image may be NSFW.
Clik here to view.

Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs

For over a year, the ThreatConnect Intelligence Research Team (TCIRT) has been tracking Pakistan-based cyber espionage activity associated with a custom malware implant recently dubbed “BITTERBUG.” In...

View Article

Image may be NSFW.
Clik here to view.

Operation SMN: From Sharing to Acting on Threat Intelligence

We at ThreatConnect are proud to be part of an industry-led Coordinated Malware Eradication (CME) initiative known as Operation SMN. The collaborative effort has targeted specific malicious...

View Article


ThreatConnect Announces Investment from Grotech Ventures

Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech...

View Article

Image may be NSFW.
Clik here to view.

Holiday Aspxor Mimics Retailers

The holiday season invites not only the best deals for online shopping, but it also introduces additional opportunities for email phishing, online scams, and more. We all know that you should be...

View Article

Five Predictions for 2015 Cybersecurity

This year has been a whirlwind of very public breaches and cybersecurity headaches. From Heartbleed to Shellshock, we know the interwebs are never as secure as we think they are. Retailers, banks, and...

View Article


Image may be NSFW.
Clik here to view.

Operation Poisoned Helmand

In this day and age of interconnected cloud services and distributed content delivery networks (CDNs), it is important for both CDN service providers and security professionals alike to recognize and...

View Article


ThreatConnect Industry Communities – Paying it Forward Produces Big Gains

The Pay It Forward movement is about the rippling effect that random acts of kindness have.  It leverages the fact that we are wired with an innate desire to help each other, and a belief that a good...

View Article

ThreatConnect Communities: A Swiss Army Knife in Your Collaboration Arsenal

ThreatConnect Communities have become the indispensable Swiss army knife in the analyst collaboration arsenal this past year.  While our community blueprint has always included – a “Common Community”...

View Article

Image may be NSFW.
Clik here to view.

Context (and Quality) is King with Threat Intelligence

Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on...

View Article

Image may be NSFW.
Clik here to view.

ThreatConnect How To: Importing Indicators

There are many advantages to having a centralized Threat Intelligence Platform (TIP) to aggregate, analyze and act on your own threat intelligence. Among them, is empowering the threat analyst to...

View Article


ThreatConnect Community Success Story: The Rubber Meets the Road

Communities, sharing, and collaboration have hit the hype curve in cyber security circles.  While the marketplace includes products that offer information exchange or are bolting on support for...

View Article

Image may be NSFW.
Clik here to view.

ThreatConnect How To: Pivoting & Exporting Data

Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built.  Developed by a number of preeminent security researchers and analysts (including our...

View Article


Image may be NSFW.
Clik here to view.

White House Initiative on Cyber Threat Sharing: A Good Start

Last week President Obama announced and signed an executive order to encourage companies to share their cyber threat information and launched the Cyber Threat Intelligence Integration Center (CTIIC)....

View Article

Image may be NSFW.
Clik here to view.

The Anthem Hack: All Roads Lead to China

When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented.  Naturally, many...

View Article


Premera Latest Healthcare Insurance Agency to be Breached

Similarities with Wellpoint/Anthem Event Should be Understood The recent announcement from Premera Blue Cross Blue Shield that it has fallen victim to a sophisticated cyber attack that reportedly...

View Article

Image may be NSFW.
Clik here to view.

Is Your Threat Intelligence Platform Just a Tool?

“If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to conduct...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence Sharing is Real

As humans, our nature is to collaborate. We are social beings; we work together, learn from each other, help one another, and entertain. This is why threat intelligence sharing has become such a hot...

View Article
Browsing all 32 articles
Browse latest View live


Latest Images