Category: Threat Intelligence
-
The Future of Threat Intelligence is Here: It’s All About Machine Learning
The future of Threat Intelligence could replace the analyst with a AI bot…
-
The APTocalypse: Who’s Who in the World of Cyber Threats
This article introduces some of the latest and most notorious APT actors and their TTPs and gives some tips on how to defend against them.
-
Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds
http://ift.tt/MtkUnG Threat intelligence feeds have become a staple in the diet of analysts and security professionals at organizations large and small. Some feeds are free, others are offered for sale from security vendors. They can also come in a dizzying array of formats, varying sizes, and include threat information that may or may not add…
-
Inside the Mind of Cyber Criminals
http://ift.tt/2fYHoOs To learn more about how cyber criminals operate in the dark web, we asked our own Andrei Barysevich a few questions. Below is what he had to say. You have spent a great deal of time studying actual cyber crime activity, forums, and behavior in recent months. What are some of the things you’ve…
-
The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence
Analysis Summary A location-specific cyber risk program evaluates cyber threats and risk at non-HQ locations to increase an organization’s information security. Recorded Future expedites threat assessments — down to just two hours to generate an initial threat assessment for a country. Without Recorded Future, two people would need at least two months per country. Recorded…
-
Recorded Future Announces Its Participation in Splunk’s Adaptive Response Initiative
Earlier this year, Splunk announced their Adaptive Response Initiative — an effort bringing best-in-breed security capabilities together in ways that will improve an organization’s ability to defend against advanced attacks. At the core of the initiative is a new version of Splunk Enterprise Security, scheduled to be generally available soon, that facilitates bi-directional integrations from…
-
Effective DarkComet RAT Analysis in 10 Minutes and 3 Clicks
Key Takeaways DarkComet RAT controller identified via a Recorded Future and Shodan alert. 10 minutes and three Recorded Future Intel Cards (including embedded Farsight Security and ReversingLabs insight) produced a substantial lead toward probable cause and a successful criminal investigation. IP Address: 73.77.225.59:1604 (Comcast Cable, Texas) Associated Domain: shadows.sytes[.]net (No-IP Dynamic DNS) Malware: b5462c4312a587171c400953f8fd79f0 (MD5)…
-
What Is Threat Intelligence? Definition and Examples
Key Takeaways Threat intelligence is the output of analysis based on identification, collection, and enrichment of relevant data and information. Always keep quantifiable business objectives in mind, and avoid producing intelligence “just in case.” Threat intelligence falls into two categories. Operational intelligence is produced by computers, whereas strategic intelligence is produced by human analysts. The…
-
How to Maximize the Return From Your Threat Intelligence Reporting
Key Takeaways Reporting is always limited by the quality of your intelligence. Make sure you’re providing genuine value, not just filling pages. If you want to maximize the value of your threat intelligence, you need to share it as widely within your organization as possible. You never know who might find it useful. Ask every…
-
Lab Test Reveals 10x Productivity Gain From Real-Time Threat Intelligence for SIEMs
Key Takeaways Independent test shows applying real-time threat intelligence powered by machine learning cuts analyst time to triage a security event from a firewall log from three minutes to 1.2 seconds on average (in a controlled environment), resulting in a 10x gain in productivity. A typical organization with only 100 devices could generate over 2,500…