Posts
-
May 5th, 2014
ThreatConnect Enables “Healthy Networking” for the Biomed and Life Sciences Industry
Have you ever taken the time to consider how you and your colleagues view cyber security? Does your security team share common viewpoints, or are there unique philosophical differences? Do you all f
-
Apr 11th, 2014
Heartburn over Heartbleed: Assuming the Worst
Since the disclosure of the CVE-2014-0160 “Heartbleed” vulnerability, the industry has been abuzz with the traditional kneejerk responses that often plague most security teams, and justifiably so;
-
Mar 21st, 2014
Old Habits Die Hard: Iterative Intelligence & Comment Crew Activity
History is made when the notable details of past events are recorded and others can then learn from and study them. For example, you can go to any library and read about the Civil War. You can read ab
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e
-
Dec 9th, 2013
The Dollars and “Sense” Behind Threat Intelligence Sharing
Intelligence Sharing: The Dollars and “Sense” Behind It Within the ThreatConnect Research Team, we feel that sharing what we know, whether publicly or privately, helps to grow our organiza
-
Oct 7th, 2013
Khaan Quest: Chinese Cyber Espionage Targeting Mongolia
Executive Summary: The ThreatConnect Research Team has identified a weaponized Microsoft Word document that contains a Concept Development Conference (CDC) announcement for the joint US and Mongolia m
-
Aug 2nd, 2013
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up
UPDATE: Operation Arachnophobia has the latest updates on this intelligence. Summary: The global proliferation of cyber espionage may be serving as a catalyst for regional entities within South Asia
-
Mar 18th, 2013
A Tale of Two Koreas: Keeping Watch over the Digital DMZ
At Cyber Squared, we understand that many targeted, government sponsored or sanctioned attacks can be directly tied to current geopolitical events. Keeping the recent instability of the Korean Peninsu
-
Feb 21st, 2013
I Got 99 Problems But a Phish Ain’t One
Today Symantec reported a targeted attack that used the Mandiant APT1 report as bait for a spearphishing attack. Brandon Dixon at 9b+ followed up with the analysis of “Mandiant_APT2_Report.pdf” a
-
Jul 23rd, 2012
There’s something about Mahdi
On 17 July 2012, researchers at Kaspersky Labs and Seculert identified over 800 victims of a new cyber espionage campaign dubbed “Mahdi”. As I researched the information that was presented, I
-
Aug 10th, 2010
5 Ways to Make Threat Analysis Actionable
What is Threat Analysis? Learn 5 Ways to Make it Actionable! Lights, Camera, All Quiet on Threats (Set) – Action! – What goes into the creation of your favorite movies? They have a directo