What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2023-08-02 12:00:00 Podcast Spotlight: Êtes-vous prêt pour la reconnaissance des menaces?
Spotlight Podcast: Are you ready for Threat Reconnaissance?
(lien direct)
Dans cette interview au podcast Spotlight, David Monnier de Team Cymru parle de l'évolution de l'intelligence des menaces en «réception de la réception» spécifique et cibler des menaces. Le message Podcast Spotlight: Êtes-vous prêt pour la reconnaissance des menaces? C'est apparu pour la première fois sur Le grand livre de sécurité avec Paul F. Roberts . Le message Podcast Spotlight: êtes-vous ... Lisez toute l'entrée ... & nbsp; & raquo; Cliquez sur l'icône ci-dessous pourÉcoutez.
In this Spotlight podcast interview, David Monnier of Team Cymru talks about the evolution of the threat intelligence into actionable and target specific “threat reconnaissance.” The post Spotlight Podcast: Are you ready for Threat Reconnaissance? first appeared on The Security Ledger with Paul F. Roberts. The post Spotlight Podcast: Are you...Read the whole entry... »Click the icon below to listen.
Threat ★★
Blog.webp 2023-02-16 04:05:28 Spotlight: Making the Most of Cyber Threat Intelligence with Itsik Kesler of KELA (lien direct) In this Spotlight episode of the Security Ledger podcast, I interview Itsik Kesler, the CTO of the threat intelligence firm Kela about the evolution of threat intelligence and findings from the company's latest State of Cybercrime Threat Intelligence report. The post Spotlight: Making the Most of Cyber Threat Intelligence with Itsik Kesler of...Read the whole entry... »Click the icon below to listen. Threat ★★★
Blog.webp 2023-01-09 13:00:00 IoCs vs. EoCs: What\'s the difference and why should you care? (lien direct) Security analysts and threat hunters know the importance of IOCs – indicators of compromise. But EOCs - enablers of compromise - are just as important. Threat ★★
Blog.webp 2022-06-20 11:30:00 Episode 239: Power shifts from Russia to China in the Cyber Underground (lien direct) Naomi Yusupov, a Chinese Intelligence Analyst at the threat intelligence firm CyberSixGill talks to host Paul Roberts about that company's new report: The Bear and the Dragon: Analyzing the Russian and Chinese Cybercriminal Communities. Threat
Blog.webp 2021-12-08 17:50:44 How to Overcome Threat Detection and Response Challenges (lien direct) In this Expert Insight, Jack Naglieri, the founder and CEO of Panther Labs, talks about the many challenges of enterprise-scale threat detection and response. Jack provides some steps organizations can take to prepare themselves for the future. Threat
Blog.webp 2021-09-22 22:28:51 Spotlight: Is There A Cure For InfoSec\'s Headcount Headache? (lien direct) In this Spotlight Podcast, Lyndon Brown, the Chief Strategy Officer at Pondurance joins host Paul Roberts to talk about how changes in both the threat landscape and the workplace are driving demand for managed detection and response (MDR) services, in which companies hire outside security talent to help keep sophisticated cyber adversaries at bay. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/667329084/0/thesecurityledger -->» Threat
Blog.webp 2020-12-10 02:03:00 Episode 196: Building the Case Against Sandworm with Cisco Talos (lien direct) isco's Matt Olney, the Director of Talos Threat Intelligence and Interdiction and Craig Williams, the Talos Director of Outreach about the case against The post Episode 196: Building the Case Against Sandworm with Cisco Talos Threat
Blog.webp 2020-12-03 03:52:50 Episode 195: Cyber Monday Super Deals Carry Cyber Risk (lien direct) While many organizations think the notion of keyboards, monitors and other hardware "spying" on them as the stuff of "James Bond" movies, Yossi Appleboum of Sepio Systems says that the threat is real - and much more common that either companies or consumers are aware. The post Episode 195: Cyber Monday Super Deals Carry Cyber Risk appeared first...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/639525626/0/thesecurityledger -->» Threat
Blog.webp 2020-03-03 21:19:00 Episode 177: The Power and Pitfalls of Threat Intelligence (lien direct) In this week's podcast (#177) we're back from RSA Conference and talking about the growing prominence of cyber threat intelligence services with Eric Olson of the firm LookingGlass Cyber Solutions. The post Episode 177: The Power and Pitfalls of Threat Intelligence Threat
Blog.webp 2019-08-17 02:47:03 Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence (lien direct) Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL's big new study of firmware security. In our second segment, we're joined by Allan Thomson who is the Chief Technology Officer at LookingGlass Cyber Solutions to talk about the growing use of cyber threat intelligence and the need to evolve cybersecurity practices to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/606605918/0/thesecurityledger -->» Threat
Blog.webp 2019-06-17 12:28:03 Cognitive Bias is the Threat Actor you may never detect (lien direct) Cognitive bias among workers can undermine security work and lead to critical misinterpretations of data, warns Forcepoint X-Labs research scientist, Dr. Margaret Cunningham. The post Cognitive Bias is the Threat Actor you may never detect Threat Guideline
Blog.webp 2019-06-06 12:00:02 Dark Web Looms Large as Enterprise Threat (lien direct) New research from the firm Bromium finds dark web listings are booming as operators offer tailored access to enterprise networks. The post Dark Web Looms Large as Enterprise Threat Threat
Blog.webp 2019-03-06 18:01:05 Devices\' UPnP Service Emerges as Key Threat to Home IoT Networks (lien direct) Home connected device users are putting their IoT networks at risk by leaving exposed a common service devices use to seamlessly connect and communicate with each other, according to cybersecurity firm Trend Micro. Hackers recently have been found to exploit the Universal Plug and Play (UPnP) service of poorly configured routers and home...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599247230/0/thesecurityledger -->» Threat
Blog.webp 2019-02-19 13:23:05 Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise (lien direct) Vijay Balasubramaniyan of Pindrop joins us to talk about it. And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month's hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components. The post Podcast Episode 134:...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/598068876/0/thesecurityledger -->» Hack Threat
Blog.webp 2019-01-28 11:00:04 (Déjà vu) Tread Lightly with Threat Intel Add-Ons (lien direct) Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you've ever shopped for a new car, you're likely familiar with the dizzying number of add-on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594410666/0/thesecurityledger -->» Threat
Blog.webp 2019-01-28 11:00:04 (Déjà vu) Buyer Beware: Not All Threat Intel Add-Ons are Equal (lien direct) Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you've ever shopped for a new car, you're likely familiar with the dizzying number of add-on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594410666/0/thesecurityledger -->» Threat
Blog.webp 2019-01-24 08:00:01 Report: IoT Still Wildly Insecure as New \'Credential Compromise\' Threat Emerges (lien direct) The new year isn't bringing good news about Internet of Things security, as a new report sheds light on a flaw that allows bad actors to take unauthorized control of applications used by the IoT devices. The post Report: IoT Still Wildly Insecure as New ‘Credential Compromise’ Threat Emerges Threat
Blog.webp 2018-12-04 21:04:02 Podcast Episode 123: HaveIBeenPwned\'s Troy Hunt on Marriott\'s Big Mess and GreatHorn on the Asymmetric Threat of Email (lien direct) Thanks to our friends at GreatHorn for sponsoring this week's podcast. In this episode of the Podcast, # 123: Troy Hunt, the founder of HaveIBeenPwned.com joins us to talk about Marriott International's big mess: a breach of Starwood Hotels' reservation system that revealed information on half a billion (with a "B") guests. And, in our second...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/583720434/0/thesecurityledger -->» Threat
Blog.webp 2018-11-04 15:08:01 Managed Threat Hunting Bridges the Talent Gap (lien direct) Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike. As we discussed in “Uncovering the Unknown Unknowns,” threat hunting is a critical discipline that more organizations...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578376292/0/thesecurityledger -->» Threat
Blog.webp 2018-06-28 14:58:05 Opinion: With Internet of Things, Devices become Insider Threat (lien direct) Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.  Connected devices present unique challenges to enterprises...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/555124602/0/thesecurityledger -->» Threat
Blog.webp 2018-06-27 19:32:01 Mobile, automation-industry leaders promote two new IoT security efforts (lien direct) Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape. On the mobile front, a number of global operators including  AT&T, China Mobile, China Telecom, China...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554973984/0/thesecurityledger -->» Threat Guideline
Blog.webp 2018-06-20 15:03:05 \'Olympic Destroyer\' resurfaces; targets financial organizations, chemical-threat-prevention labs (lien direct) The Olympic Destroyer malware behind an attack on the 2018 Winter Olympic Games in Seoul resurfaced with new targets in its sites: financial organizations and biological and chemical threat prevention laboratories, according to new research from Kaspersky Lab. Olympic Destroyer was first spotted back in February as a cyberattack on the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553672430/0/thesecurityledger -->» Malware Threat
Last update at: 2024-04-28 14:13:13
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter