RH-ISAC Releases Cyber Intelligence Summit Post-Conference Report

The annual RH-ISAC Cyber Intelligence Summit was held in Plano, Texas on September 20-21, 2022. Summit is the premier event for cybersecurity practitioners in the retail, hospitality, and travel industries. This year’s event had nearly 400 attendees for two days full of presentations and networking. The post-conference report is now available to download. It includes details about…

Read More

New Intelligence Trends Report Analyzes Cyber Threats in the Retail, Hospitality, and Travel Sectors

Vienna, VA (September 29, 2022) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today released the first-ever public version of the Retail & Hospitality Intelligence Trends Summary, which analyzes trends in the cyberthreat landscape for the retail, hospitality, and travel sectors. The report sheds light on the top threats and malware families reported…

Read More

Retail & Hospitality ISAC Announces Award Winners

Vienna, VA (September 21, 2022) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) announced its 2022 award winners during the annual membership meeting held on September 20 in Frisco, Texas. The awards recognize outstanding companies and individuals who have displayed extraordinary dedication to RH-ISAC’s mission to build a collaborative sharing community that enables consumer-facing…

Read More

RH-ISAC Announces Splunk as Title Sponsor for Cyber Intelligence Summit

Vienna, VA (August 30, 2022) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced that Splunk will be the title sponsor of the RH-ISAC Cyber Intelligence Summit which takes place September 20-21 in Dallas/Plano, TX.   This annual event is tailored for strategic leaders and cybersecurity practitioners from physical and online retailers, hotels,…

Read More

Technical Details for C2 Tool “Dark Utilities” Leveraged in Malware Campaigns

Context On August 4, 2022, Cisco Talos Intelligence researchers reported new technical details of a tool called “Dark Utilities” that provides a full suite of command-and-control (C2) capabilities for threat actors. The tool, which was released in early 2022, is advertised by creators as enabling remote access, command execution, distributed denial-of-service (DDoS) attacks, and cryptomining…

Read More