Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ibm x-force threat intelligence index Breakdown

IBM have just released their coveted X-Force Threat Intelligence Index 2023 report, tracking new, existing and evolving threat insights, discovered over the last year. This in-depth, 58-page report explores threat actor’s exploitation of the after-effects of a global pandemic, and the turmoil caused by conflict between Russia and Ukraine, as IBM states “creating exactly the kind of chaos in which cybercriminals thrive. And thrive they did.”.

Importance of great communication

In all relationships, issues can arise. The key to solving those issues is to have a clear understanding of the issue itself. For instance, when a customer reports an issue it is critical to listen to the customer with patience and empathy so that they feel understood, and to assure them that they will receive assistance promptly. Furthermore, product issues can present themselves in various forms of complexities.

Hangin' with Haig: Conversations Beyond the Keyboard

ThreatQuotient's Director of Alliances, Haig Colter, assumes the role of host in our series Hangin’ with Haig: Conversations Beyond the Keyboard. In our upcoming episode, we welcome Valéry Marchive. Co-founder of LeMagIT, Valéry has been its editor-in-chief since January 2020. A computer scientist by training, he specialised in cybersecurity and has developed an investigative approach to his journalistic practice, both in studying known cyberattacks and in understanding the dynamics of cybercrime. For several years, he has meticulously investigated cyber attacks with ransomware and their perpetrators.

Dialing-up Data to Tackle Expanding Security Challenges

Many security professionals feel like broken records at this point when we say, “the threat landscape is constantly evolving”, and especially when we talk about how security operations centers (SOCs) are always trying to do more with less. But over the last couple of years, what we think of as standard security issues have evolved into several new, daunting challenges.

There's a New and Potentially More Dangerous Arrow in Cupid's Quiver

It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look for love online, it’s a good time for a reminder that more people lose more money in online romance scams than in any other fraud category. According to the FBI, over the past five years $1.3 billion in losses have been reported, with annual losses skyrocketing since the pandemic.

Elastic Global Threat Report Breakdown: Defense Evasion

When we published the Elastic Global Threat Report in 2022, it included threat trends and correlations from our analysis of telemetry data shared by our users. In addition to telling us about how well features work for them, it also represents our visibility of the threat landscape. About 34% of the techniques we saw were related to defense evasion, which we believe is a direct result of endpoint security innovations.

ISO 27001 welcomes Threat Intelligence

In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders with different types of intelligence requirements in order to have a proactive security approach. 2022 was a productive year for ISO (International Organization for Standardization) security standards.

The Evolution Of Cyber Threat Intelligence: Graduating From Actionable To Impactful

In the world of cybersecurity, it’s widely understood that threat intelligence must be “actionable.” Although this is true, it’s just one characteristic of what makes threat intelligence valuable to a business. There are several other criteria that must be satisfied for intelligence to be impactful. At Cyberint, we believe that impactful intelligence is the next step in the evolution of cyber threat intelligence.