Category: Threat Intel

  • Carbon Black’s Detection eXchange puts humans back into threat sharing

    Carbon Black’s Detection eXchange puts humans back into threat sharing http://ift.tt/291TaUe The attackers know what they’re up against It’s time the tables were turned. As the toll of successful cyberattacks has spiked it’s become uncomfortably obvious that IT professionals trying to keep attackers out of critical systems are at a massive disadvantage before they design…

  • IoT Botnet — 25,000 CCTV Cameras Hacked to launch DDoS Attack

    IoT Botnet — 25,000 CCTV Cameras Hacked to launch DDoS Attack http://ift.tt/291Su1u The Internet of Things (IoTs) or Internet-connected devices are growing at an exponential rate and so are threats to them. Due to the insecure implementation, these Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Set-top boxes, Security Cameras and printers,……. Threat Intel via…

  • Here’s How a Hacker Extorts a Clinic

    Here’s How a Hacker Extorts a Clinic http://ift.tt/2977Up8 The Unsettling Tale of How ‘The Dark Lord’ Shakes Down Targets An individual claiming to be the hacker who posted four healthcare databases on the dark web reveals some of his tactics. We take a close look at the risks posed to one affected clinic, which faces…

  • EclecticIQ and Cosive ink partnership to bring advanced Cyber Threat Intelligence technologies to Australia and New … – PR Newswire UK (press release)

    EclecticIQ and Cosive ink partnership to bring advanced Cyber Threat Intelligence technologies to Australia and New … – PR Newswire UK (press release) http://ift.tt/29312pI AMSTERDAM, June 28, 2016 /PRNewswire/ — As demand for advanced Cyber Threat Intelligence heats up worldwide, EclecticIQ and Cosive…

  • Third Hack Linked To SWIFT Network Costs $10 Million

    Third Hack Linked To SWIFT Network Costs $10 Million http://ift.tt/292isng In this day and age, people like to know that their bank is keeping their money safe. Sadly in this day and age where everything is connected that is harder to do than most would imagine and it would now seem that a third bank…

  • US Businesses Quite Likely to Pay a Cyber-Ransom

    US Businesses Quite Likely to Pay a Cyber-Ransom http://ift.tt/29a5Cpw Survey results reveal that companies that paid ransoms reported an average of $7,500 in the US and £22,000 in the UK. Threat Intel via CERT-EU : EMM AlertFilter System: CERT-LatestNews http://ift.tt/1gYYfLb June 28, 2016 at 05:51PM

  • Energy Bill Scam Locks Computer Files

    Energy Bill Scam Locks Computer Files http://ift.tt/293ev0H Most people in Australia would have heard about the recent email scam doing the rounds, purporting to be from a well-known energy company. The email prompted the recipient to click on a link to download a copy of their bill. Instead of downloading an invoice however, the victims…

  • Hacked emails show Hillary Clinton campaign’s surveillance of journalists as aides ordered volunteers to ‘keep an eye’ on reporters

    Hacked emails show Hillary Clinton campaign’s surveillance of journalists as aides ordered volunteers to ‘keep an eye’ on reporters http://ift.tt/291qPkW The hacked Gmail account of one of Hillary Clinton’s volunteers shows how the campaign surveils journalists who might get too close to the candidate. Threat Intel via CERT-EU : EMM AlertFilter System: CERT-LatestNews http://ift.tt/1gYYfLb June…

  • Teenager admits series of global cyber attacks

    Teenager admits series of global cyber attacks http://ift.tt/29acC5Y The teenager, who cannot be named, appeared at Plymouth Youth Court to admit three offences under Section 3 of the Computer Misuse Act. These offences, committed between October 2014 and January 2015, relate to denial of service attacks on numerous … Threat Intel via CERT-EU : EMM…

  • pytbull – Intrusion Detection/Prevention System (IDS/IPS) Testing Framework

    pytbull – Intrusion Detection/Prevention System (IDS/IPS) Testing Framework http://ift.tt/28Z3QC3 pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can be used to test the detection and blocking capabilities of an IDS/IPS, to compare IDS/IPS, to compare configuration modifications and to check/validate configurations. Threat…