Search results for:
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e
-
Jan 7th, 2014
Cyber Squared Launches ThreatConnect™ API
API Allows Automated Access and Synchronization of Threat Intelligence Data Cyber Squared Inc. announced today that ThreatConnect™, the leading threat intelligence platform, has added the ThreatConn
-
Dec 18th, 2013
ThreatConnect Takes Signature Management to the Next Level
In modern enterprises, signature based threat detection capabilities are still considered a fundamental building block in most network defense strategies. To stay ahead of today’s sophisticated th
-
Dec 9th, 2013
The Dollars and “Sense” Behind Threat Intelligence Sharing
Intelligence Sharing: The Dollars and “Sense” Behind It Within the ThreatConnect Research Team, we feel that sharing what we know, whether publicly or privately, helps to grow our organiza
-
Nov 7th, 2013
Quickly Assess Maliciousness of Suspicious Activity with “Analyze”
Today’s IT security professionals are faced with mounting piles of log files, suspected malicious email attachments, and malware samples that could provide evidence of an attempted intrusion int
-
Oct 28th, 2013
ThreatConnect Launches STIX Sharing Prototype To Connect Community-developed Threat Intelligence with Network Defense Platforms
ThreatConnect Platform leverages its community-driven sharing and analysis capabilities to enrich sophisticated threats discovered and mitigated in network defense systems using the Structured Threat
-
Oct 7th, 2013
Khaan Quest: Chinese Cyber Espionage Targeting Mongolia
Executive Summary: The ThreatConnect Research Team has identified a weaponized Microsoft Word document that contains a Concept Development Conference (CDC) announcement for the joint US and Mongolia m
-
Aug 2nd, 2013
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up
UPDATE: Operation Arachnophobia has the latest updates on this intelligence. Summary: The global proliferation of cyber espionage may be serving as a catalyst for regional entities within South Asia
-
Jul 16th, 2013
July 16, 2013 – Epoch Times : Chinese Hackers Dropbox Their Viruses
Disguised as government papers, viruses sent by Chinese hackers have been making their rounds through Dropbox, a popular cloud-based Internet service that allows users to share files, in a new method
-
Mar 18th, 2013
A Tale of Two Koreas: Keeping Watch over the Digital DMZ
At Cyber Squared, we understand that many targeted, government sponsored or sanctioned attacks can be directly tied to current geopolitical events. Keeping the recent instability of the Korean Peninsu
-
Feb 21st, 2013
I Got 99 Problems But a Phish Ain’t One
Today Symantec reported a targeted attack that used the Mandiant APT1 report as bait for a spearphishing attack. Brandon Dixon at 9b+ followed up with the analysis of “Mandiant_APT2_Report.pdf” a
-
Jul 23rd, 2012
There’s something about Mahdi
On 17 July 2012, researchers at Kaspersky Labs and Seculert identified over 800 victims of a new cyber espionage campaign dubbed “Mahdi”. As I researched the information that was presented, I