DMARC & BIMI: The Ultimate Multi-tool Against Phishing and Ransomware

Email phishing is the most dominant attack vector for cybercrime and ransomware worldwide. Hackers aren’t sneaking in through some backdoor, instead, they’re strolling in through the front thanks to insecure or misconfigured email systems and a lack of sufficient protocols. But what are the measures businesses need to be putting in place to stop this,…

Read More

The Ease and Benefit of Automating Threat Intel with PyOTI

Between keeping up with your alerts, putting together reports, running through your daily checklists, or whatever else it may be throughout your day, I think one thing we can all agree on is there is never enough time in the day! As I’ve progressed in my career, I’ve tried to become lazier in my work….

Read More

Current COVID-19 Trend: Malspam Campaigns

The entire world is on edge, watching as COVID-19 continues to spread at an exponential rate. The uncertainty and unknowns around the illness have all of us thirsty for news and information about the virus: we all want to know what’s going on and how we can best protect our families. Hackers are taking full…

Read More

HiddenWasp and the Emergence of Linux-based Threats

The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new challenges to the information security community that have not been observed previously in other operating systems. The low detection rates in anti-virus solutions can likely be attributed…

Read More

The Need for Cyber Threat Intelligence: What Are we Concerned About? Part 2

Cyber threat intelligence (CTI) requirements guide not only what intel is collected, but also how it is analyzed and used for IR, the SOC analyst and the business, as well. Developing a good set of requirements helps the organization: Monitor the right threat actors Collect the most useful intel Prepare intelligence in the right format…

Read More