Search results for:
-
Oct 28th, 2013
ThreatConnect Launches STIX Sharing Prototype To Connect Community-developed Threat Intelligence with Network Defense Platforms
ThreatConnect Platform leverages its community-driven sharing and analysis capabilities to enrich sophisticated threats discovered and mitigated in network defense systems using the Structured Threat
-
Oct 7th, 2013
Khaan Quest: Chinese Cyber Espionage Targeting Mongolia
Executive Summary: The ThreatConnect Research Team has identified a weaponized Microsoft Word document that contains a Concept Development Conference (CDC) announcement for the joint US and Mongolia m
-
Aug 2nd, 2013
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up
UPDATE: Operation Arachnophobia has the latest updates on this intelligence. Summary: The global proliferation of cyber espionage may be serving as a catalyst for regional entities within South Asia
-
Jul 16th, 2013
July 16, 2013 – Epoch Times : Chinese Hackers Dropbox Their Viruses
Disguised as government papers, viruses sent by Chinese hackers have been making their rounds through Dropbox, a popular cloud-based Internet service that allows users to share files, in a new method
-
Mar 18th, 2013
A Tale of Two Koreas: Keeping Watch over the Digital DMZ
At Cyber Squared, we understand that many targeted, government sponsored or sanctioned attacks can be directly tied to current geopolitical events. Keeping the recent instability of the Korean Peninsu
-
Feb 21st, 2013
I Got 99 Problems But a Phish Ain’t One
Today Symantec reported a targeted attack that used the Mandiant APT1 report as bait for a spearphishing attack. Brandon Dixon at 9b+ followed up with the analysis of “Mandiant_APT2_Report.pdf” a
-
Jul 23rd, 2012
There’s something about Mahdi
On 17 July 2012, researchers at Kaspersky Labs and Seculert identified over 800 victims of a new cyber espionage campaign dubbed “Mahdi”. As I researched the information that was presented, I
-
Aug 10th, 2010
5 Ways to Make Threat Analysis Actionable
What is Threat Analysis? Learn 5 Ways to Make it Actionable! Lights, Camera, All Quiet on Threats (Set) – Action! – What goes into the creation of your favorite movies? They have a directo
-
Jan 24th, 2022
ThreatConnect Report: CyberSecurity Under Stress
SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compound
-
Jan 6th, 2022
A ThreatConnect Customer Success Story: Maturing Cybersecurity Infrastructure with Intelligence-Driven Operations
Find out how ThreatConnect enabled this organization to mature their cybersecurity infrastructure by: Removing silos, providing a centralized platform for threat intelligence and security operations p
-
Mar 2nd, 2023
Modernize Your Threat Intelligence Platform (TIP) Whitepaper
A modern Threat Intelligence Platform (TIP) can help right the balance of power between attackers and defenders by allowing CTI teams to build, focus, and provide threat intelligence relevant to the b
-
Dec 16th, 2021
Cyber Risk Quantification – A practical guide for the C-Suite
For most firms, cyber risk management is an endless discussion of theoretical risk postures and registers filled with aging risk topics. Risk-based, data-driven quantitative models, such as ones promo