Tools for illegally mining Coinhive, Monero, and other cryptocurrency dominate list of most prevalent malware in December 2018. Enterprise organizations appear unlikely to get respite from cryptomining attacks anytime soon if new threat data from Check Point Software is any indication. For the thirteenth month in a row, attacks involving the use of cryptomining malware
We need more stringent controls and government action to prevent a catastrophic disaster. The Federal Aviation Administration says today’s aircraft is safe from cybercriminals. Major aircraft builders say the same thing. But the Department of Homeland Security (DHS) and the Department of Energy say “Not so fast.” A few influential politicians and some experts in
To succeed, organizations must be empowered to reduce their attack surface and staff overload so they can get more out of their existing firewall and threat intelligence investments. There is no doubt that threat intelligence (TI) and information sharing have become critical requirements for successful security operations and cyber defense. Guidelines, like the NIST Cybersecurity
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data. Threat intelligence feeds, sold for hundreds of thousands of dollars per year, are marketed on a specific premise: If an entity is seen acting maliciously in one place, it can be expected in others. But that’s not necessarily
How Enterprises Are Using IT Threat Intelligence Concerns over nation-state actors and other security threats are driving enterprises to rethink the way they collect and analyze cybersecurity data. A high percentage of organizations are seeking to augment their internal telemetry with external threat data so they can identify and respond to potential data compromises faster.
Cyber security tools have come a long way. Embracing the changing tides of automation, they’ve become force multipliers – versus reactive tools – and are helping Chief Information Security Officers (CISO) cut down on response time. The ultimate goal: to bolster overall security and strive for real-time response. In order to reach those marks, solutions
On Sept. 12, the Cyber Security Hub led a webinar alongside Thycotic on the importance of privileged access management principles, as well as the rationale of today’s threat actors. A measurable success, the webinar drew a record number of registrants, all of whom appeared eager to learn about the morphing threat landscape. Thycotic’s Chief Security