SANS Top New Attacks and Threat Report
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
While investigating websites, analysts often acquire images, either as individual files from the sites or as screenshots (perhaps from Iris Investigate). The question is then “Can we identify images that …
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
Risk management is central to modern operational cybersecurity practice. DomainTools currently uses a proprietary machine learning model to compute risk scores for effective 2nd-level domains. This comparative case study looks …
Research conducted by ESG found that 58% of organizations have a threat intelligence program, however with a reliance on manual processes and incompatible tools, organizations struggle to realize the value …
The most recent DomainTools Report examines hotspots of malicious Internet infrastructure by TLD, IP and name server ASN, IP hosting country, domain registrar, and SSL certificate issuer.
What is Security Information and Event Management (SIEM)? Security Information and Event Management (SIEM) is an approach to security management that combines security information management (SIM) and security event management …
This Elastic Global Threat Report is a product of Elastic Security Labs, our threat research branch with expertise in investigating computer network intrusions, analyzing malicious software, developing mitigations for broad categories of threats, and c…
The energy industry, like every other, is driven by myriad decisions, each of which depends on the best available data. In addition, the energy industry has multiple unique characteristics that challenge that data’s accuracy, quality, security, a…
While security tools have become more adept at detecting payloads in emails, attacks that lack known indicators and rely instead on impersonation/social engineering tactics are successfully bypassing these traditional controls and reaching inboxes. …
