Conceptualizing a Continuum of Cyber Threat Attribution
Few topics in the field of Cyber Threat Intelligence (CTI) prompt as much passion and debate as the concept of threat attribution. From numerous conference talks, to blogs and papers, …
Few topics in the field of Cyber Threat Intelligence (CTI) prompt as much passion and debate as the concept of threat attribution. From numerous conference talks, to blogs and papers, …
The initial launch of Farsight Security’s DNSDB® allowed users to search for patterns in passive DNS expressions. Built with ease of use in mind, DNSDB allows security teams to pivot …
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily long-gone, the persistence of ransomware …
The Evolution of Threat Hunting Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, …
While investigating websites, analysts often acquire images, either as individual files from the sites or as screenshots (perhaps from Iris Investigate). The question is then “Can we identify images that …
In recent years, organizations around the world realized that a new era of cyber threats had dawned. Ransomware has advanced significantly and is now capable of taking out infrastructure and …
Risk management is central to modern operational cybersecurity practice. DomainTools currently uses a proprietary machine learning model to compute risk scores for effective 2nd-level domains. This comparative case study looks …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
Earlier detection and more comprehensive domain intelligence from DomainTools avoids organizational risk and improves security team efficiency, helping teams identify more malicious threats faster.
Cyberattacks are a top priority in most IT organizations; the risk associated with ransomware attacks, data breaches, business email compromise, and supply chain attacks has garnered that significant attention be …