Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 618 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Top Malware Strains Used by Threat Actors in 2021 – CISA Alert
Threat Intelligence Operations

Top Malware Strains Used by Threat Actors in 2021 – CISA Alert

Malware continues to grow in sophistication as record numbers of cyberattacks occur worldwide. Malware is often the tip of the spear for threat actors — first, they use it to compromise a computer or mobile device and then gain access to it. In recognition of the expanding threat that malware presents, the US Cybersecurity and […]

The Top Security Risks of Remote Working
Threat Intelligence Operations

The Top Security Risks of Remote Working

The pandemic brought major changes to the way organizations work. The rapid adoption of work from anywhere (WFA), completely changed the enterprise cybersecurity landscape.  A recent survey, led by Ipsos Research and management consulting firm, McKinsey, shows that 92 million US workers have the opportunity to work remotely. During the survey, 25,000 Americans were queried, […]

Black Hat USA 2022 Cybersecurity Conference Highlights
Threat Intelligence Operations

Black Hat USA 2022 Cybersecurity Conference Highlights

Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in person!  Our team had a great time at the conference and wanted to share some highlights they noticed […]

FBI FLASH on RagnarLocker Ransomware Expands Known Indicators of Compromise
Threat Intelligence Operations

FBI FLASH on RagnarLocker Ransomware Expands Known Indicators of Compromise

The Federal Bureau of Investigation has recently released an updated FLASH Number CU-000163-MW as part of the overall Government efforts to identify and document ransomware threat actors and the multitude of ransomware variants they deploy. RagnarLocker first surfaced in April 2020 and continues to impact a wide variety of critical infrastructure sectors. These sectors include […]

5 Steps to Combat Phishing With Intelligence-Powered Security Operations
Threat Intelligence Operations

5 Steps to Combat Phishing With Intelligence-Powered Security Operations

Did you know there were over 1 million phishing attacks just in Q1 of this year? 1,025,968, to be exact! Phishing attacks are getting more sophisticated and involve more clever ways to entice end users to click on those links. Security operations teams are overwhelmed with the number of suspected phishing emails and the lack […]

Top 3 Ways To Defend Your Organization – CISA Issues Critical Alert on MedusaLocker Ransomware
Threat Intelligence Operations

Top 3 Ways To Defend Your Organization – CISA Issues Critical Alert on MedusaLocker Ransomware

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury, and the Financial Crimes Enforcement Network (FinCEN) have recently released a Cyber Security Advisory AA22-1812A to provide updated information on MedusaLocker ransomware.  This advisory is part of the Government’s efforts to document ransomware threat actors and the […]

Put Threat Intelligence at the Core of your Security Operations
Threat Intelligence Operations

Put Threat Intelligence at the Core of your Security Operations

Threat intelligence teams have a problem, a big data problem due to the velocity, variety, and volume, of the different sets of data they collect. Data comes through non-stop in different forms, from different sources, and from different environments. To make matters worse, not all data is good data because it’s not always accurate or […]

Community Powered Insight Gives Defenders the Advantage
ThreatConnect Platform

Community Powered Insight Gives Defenders the Advantage

Leveraging Automation and the Cloud to Improve Cyber Response Threats are moving faster than ever in today’s cyber threat environment. A timely and impactful response to an ongoing cyberattack is critical. Yet, still, today, many companies cannot detect any potentially malicious activity, especially in the early phases of an attack. Most companies are just outnumbered […]

When It Comes To CRQ, What Is An “Open” Model and Is It The Right Question To Ask?
Cyber Risk Quantification

When It Comes To CRQ, What Is An “Open” Model and Is It The Right Question To Ask?

As more companies look to quantify cyber risk in financial terms, a common question we hear all the time is, “which model (or approach) should I use?.” I saw an interesting quote from a Gartner® research note titled “Drive Business Action with Cyber Risk Quantification “ that spoke about where the CRQ space is going: […]

Move Faster with ThreatConnect 6.6
ThreatConnect Platform

Move Faster with ThreatConnect 6.6

Security teams need to move at the speed of the business. Teams don’t want to be slowed down by burdensome tasks like manually digging through threat intel or manually triaging alerts. They want to make fast, easy decisions to identify and protect against the most relevant threats. We’ve got you covered! In the 6.6 release […]

How Software Vendors Can Leverage Cyber Threat Intelligence for Threat Hunting
Threat Intelligence Operations

How Software Vendors Can Leverage Cyber Threat Intelligence for Threat Hunting

In recent years, there’s been an increase in attacks targeted specifically toward enterprise software vendors. Nation-states and cyber-criminal gangs are persistently attacking these organizations with increasing sophistication. Attacks like the one against SolarWinds exemplify the challenges software vendors face and it’s getting worse. Microsoft noted that Russian hackers are systematically attempting to infiltrate technology supply […]

Prioritize Attack Analysis and Response With Actionable Intelligence
Threat Intelligence Operations

Prioritize Attack Analysis and Response With Actionable Intelligence

Analysts are overwhelmed by a number of things: the thousands of alerts they receive in a day, the intricacies of hidden details in email messages, embedded links, and attachments, or the inability to control users clicking on malicious materials. Managing the volume of emails and understanding trends in attacks is unwieldy as security teams grapple […]

Browse More Resources