-
Dec 21st, 2014
Operation Poisoned Helmand
In this day and age of interconnected cloud services and distributed content delivery networks (CDNs), it is important for both CDN service providers and security professionals alike to recognize and
-
Nov 20th, 2014
ThreatConnect Announces Investment from Grotech Ventures
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech
-
Oct 6th, 2014
Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs
For over a year, the ThreatConnect Research Team has been tracking Pakistan-based cyber espionage activity associated with a custom malware implant recently dubbed “BITTERBUG.” In August of 2013
-
Aug 5th, 2014
Operation Arachnophobia: The Spy-der Who Loved Me
The story of Operation Arachnophobia is not unlike a good spy novel; the characters aren’t who they appear to be, motives must always be questioned and the twists in the plot keep you guessing until
-
Jul 3rd, 2014
Getting Back to the Basics of Actionable Threat Intelligence
I remember it like it was yesterday, the first few hours of basic training. I stood there cooking in the South Carolina humidity with a very loud and short man, named Drill Sergeant Doll screaming a f
-
Jun 27th, 2014
Getting the Most out of Crowdsourcing Threat Intelligence
Earlier this week, we saw an article by Robert Ackerman Jr. on Dark Reading about crowdsourced threat intelligence and cyber security. Of course we were excited to see more discussion on threat intell
-
Jun 19th, 2014
How To Streamline Threat Intel Sharing Before Lunch
We saw recently that GCHQ is poised to create a threat intelligence sharing community between public and private organizations in the UK. We applaud this effort and hope that more organizations follow
-
May 19th, 2014
Piercing the Cow’s Tongue: China Targeting South China Seas Nations
Executive Summary: The term “Cow’s Tongue” is a reference to the Chinese recognized nine-dashed line which demarks a highly contested region also known as the South China Sea (SCS). Between Jul
-
May 5th, 2014
ThreatConnect Enables “Healthy Networking” for the Biomed and Life Sciences Industry
Have you ever taken the time to consider how you and your colleagues view cyber security? Does your security team share common viewpoints, or are there unique philosophical differences? Do you all f
-
Apr 11th, 2014
Heartburn over Heartbleed: Assuming the Worst
Since the disclosure of the CVE-2014-0160 “Heartbleed” vulnerability, the industry has been abuzz with the traditional kneejerk responses that often plague most security teams, and justifiably so;
-
Mar 21st, 2014
Old Habits Die Hard: Iterative Intelligence & Comment Crew Activity
History is made when the notable details of past events are recorded and others can then learn from and study them. For example, you can go to any library and read about the Civil War. You can read ab
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e