Viva Las Black Hat 2019

RH-ISAC is excited to attend the 22nd annual Black Hat conference in fabulous Las Vegas this August. We expect to see many of our members in attendance and we want you to know that for RH-ISAC, Vegas means business. Read on to see how we will be spending our time in Vegas. RH-ISAC General Meet…

Read More

HiddenWasp and the Emergence of Linux-based Threats

The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new challenges to the information security community that have not been observed previously in other operating systems. The low detection rates in anti-virus solutions can likely be attributed…

Read More

Progress in the Global Fight against Fake Emails

Valimail has been doing rigorous analysis on the data behind email frauds since the company’s earliest days. And we’ve been publishing research reports based on that deep insight for several years. Valimail’s research program now sets the industry standard for reliable, hype-free data on the state of email fraud, email authentication, and identity-based email attacks….

Read More

How To Mitigate Account Takeover In Retail

RH-ISAC article featured on Retail IT Insights. The below is an excerpt from the article. For the full post, visit: https://www.retailitinsights.com/doc/how-to-mitigate-account-takeover-in-retail-0001 Online shopping is pervasive, especially as more and more retailers expand their digital commerce. While online shopping provides a multitude of benefits for both retailers and consumers, it also has created a new threat…

Read More

Collective Genius, Common Purpose In-Person Events Build Relationships, Trust

Even more important than the virtual intel sharing we do every day is the networking and discussions that build relationships and deepen trust among our teams. Trust is created through in-person dialog and mutual respect during these face to face workshops. Deep trust will enable us to share more openly and freely whether through the listserv, threat intel calls, or through 1:1 intelligence sharing.

Read More