Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Rolling your own Detections as Code with Elastic Security

From its beginning, the Elastic detection-rules repo not only contained Elastic’s prebuilt detection rules, but also additional tooling for detection rule management — like a suite of tests, CLI commands, and automation scripts used by the Elastic Threat Research and Detection Engineering (TRaDE) team.

Insider Threats Maintain a Rising Trend

“When the cat’s away, the mouse will play,” the old adage goes. Filings to anti-fraud non-profit Cifas would support that claim, as Insider Threat Database (ITD) reports rose by 14% this past year and are largely attributable to hard-to-monitor work-from-home employees mixed with “increasing financial pressures.” The report details further incidents of dishonest behavior as recorded this year by the UK’s National Fraud Database (NFD).

Selecting the Optimal Threat Intelligence Platform in 5 Steps

To use threat intelligence and data more productively, many organizations are investing in a threat intelligence platform (TIP). Selecting a TIP is important as it will serve as the foundation for your entire security operations program, allowing you to understand and act upon the highest priority threats you face, while enabling you to get more from your existing resources — technology and people. However, amidst a plethora of options, selecting the right TIP can be daunting.

"Unknown" Initial Attack Vectors Continue to Grow and Plague Ransomware Attacks

Trend analysis of ransomware attacks in the first quarter of this year reveals a continual increase in the number of "unknown" initial attack vectors, and I think I might understand why. There are two reports that you should be keeping an eye on—the updated Verizon Data Breach Report and ransomware response vendor Coveware’s Quarterly Ransomware Reports. In their latest report covering Q1 of this year, we see a continuing upward trend in “unknown” as the top initial attack vector.

Attackers Leveraging XSS To Make Phishing Emails Increasingly Evasive

Attackers are exploiting Reflected Cross-Site Scripting (XSS) flaws to bypass security filters, according to a new report from Vipre. This technique allows attackers to send benign links in phishing emails that will redirect users to malicious sites. Vipre also found that attackers are increasingly using links instead of malicious attachments in their phishing emails. “Three years ago, it was a 50/50 split between phishing emails utilizing links versus attachments,” the researchers write.

New Research: Number of Successful Ransomware Attacks Rise 29% in a Just One Year

New analysis of Q1’s ransomware attacks uncovers a single group responsible for the majority and discusses what makes them so successful. This sort of analysis helps to establish threat landscape trends and keeps our collective focus on the places where cyber attacks are working.

How Amazon Marketing Agencies and Sellers Work Together

For businesses selling products on Amazon's massive e-commerce platform, the opportunities for growth and revenue are immense. But so is the competition from other sellers vying for the same digital real estate and customer attention. Given these intense market dynamics, many brands wisely choose to partner with specialized Amazon marketing agencies to elevate their product visibility and conversion rates.