Current COVID-19 Trend: Malspam Campaigns

The entire world is on edge, watching as COVID-19 continues to spread at an exponential rate. The uncertainty and unknowns around the illness have all of us thirsty for news and information about the virus: we all want to know what’s going on and how we can best protect our families. Hackers are taking full…

Read More

HiddenWasp and the Emergence of Linux-based Threats

The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new challenges to the information security community that have not been observed previously in other operating systems. The low detection rates in anti-virus solutions can likely be attributed…

Read More

The Need for Cyber Threat Intelligence: What Are we Concerned About? Part 2

Cyber threat intelligence (CTI) requirements guide not only what intel is collected, but also how it is analyzed and used for IR, the SOC analyst and the business, as well. Developing a good set of requirements helps the organization: Monitor the right threat actors Collect the most useful intel Prepare intelligence in the right format…

Read More

The Need for Cyber Threat Intelligence: What Are we Concerned About?

This is one of a series of posts addressing key threats to the retail sector in an attempt to identify which information assets and systems must be protected, and to examine the value of identifying adversaries and intelligence consumers. Today, the most serious data breaches and disruptions result from well-planned, complex attacks that target specific…

Read More

Targeting the Supply Chain

Threat actors are increasingly targeting supply chain organizations to get around ever more hardened corporate perimeters, modifying their products to achieve a range of potential effects, such as cyber espionage, organizational disruption or demonstrable financial impact. According to a recent report by the National Counterintelligence and Security Center (NCSC), software supply chain infiltration has already…

Read More