Cyber Resilience Insights

NU ABONNEREN

Security, Threat Center
Luchtvaartmaatschappijen kampen met schendingen

It may be safer to fly in an airplane than to book your travel. While there is a very rem… Read More >

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber criminals have been targeting airlines and succee… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 14, 2019

Security, Threat Center
Threat Intelligence Best Practices for Lean IT Organiza…

Make your organization a harde… Read More >

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, … Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted May 07, 2019

Security, Threat Center
Threat Intelligence Best Practices for Lean IT Organiza…

Here’s why looking at in… Read More >

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity profess… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted May 01, 2019

Security, Threat Center
Inzicht in dreigingsinformatie: verder kijken dan het eerstvolgende compromis

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot… Read More >

Threat intelligence doesn’t mean subscribing to multiple data feeds. There is a lot of confusion and misunderstanding about what constitutes threat intelligence. Too often, threat intelligence gets misaligned with tracking a bunch of Indicators of Compromise (IoCs), and the underlying assumpt… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted Mar 05, 2019

Security, Threat Center
De terugkeer van de Equation Editor Exploit – DIFAT Overflow

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Rese… Read More >

The latest from Mimecast Research Labs. Summary In the last few months, the Mimecast Research Labs team has seen several unique variants of Microsoft Office Word exploits, more specifically combining the previously-patched memory corruption issue CVE-2017-11882 (AKA the Equation Editor Exploit), wi… Read More >

Meni Farjon

by Meni Farjon

Chief Scientist for Advanced Threat Detection

Posted Mar 05, 2019

Security, Threat Center
Wereldwijde aanvallen doen zich dagelijks voor

No government is safe. There … Read More >

No government is safe. There seems to be a resurgence of interest in the belief that the world is flat despite all evid… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Feb 25, 2019

Popular Posts

Older Posts

Security, Threat Center

Dreigingsinformatie voor de 99 procent - Deel 8: Laatste overwegingen & tips

Here’s what you need to know on your threat intelligence journey. Welcome to the 8th and final edition of our blog series, Threat Intelligence for the 99%. We’ve reached the end of the road for these blogs, but hopefully your road to thr…

Read More >

Security, Threat Center

GandCrab Ransomware Attacks Exploit Valentine’s Day Weaknesses

This Valentine’s Day, your big heart could get you in trouble. When you think Valentine’s Day, candy hearts, roses and chocolate are probably the first things that come to mind. Perhaps the last thing would be insidious email attacks, bu…

Read More >

Security, Threat Center

Dreigingsintelligentie voor de 99% - Deel 7: Het volledige plaatje

How do you put all the threat intelligence components together? Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. In the last two editions of our series, we’ve looked at cyber threat intelligence (CTI) …

Read More >

Security, Threat Center

Threat Intelligence voor de 99% - Deel 6: Bepaal uw eigen hulpmiddelen

Selecting the right threat intelligence tools is critical. Welcome to the latest edition of our ongoing blog series, Threat Intelligence for the 99%. Last time, we examined the types of cyber threat intelligence (CTI) feeds you need to consider when…

Read More >

categories

Read More >

Meer info

Popular Posts