Tuesday, June 15, 2021

Analytics

Overview of security incidents from May 29 to June 4, 2021

Attacks on Linux servers, banking Trojans disguised as Kaspersky Lab anti-virus applications, a new generation of cyber ransomware groups, interruptions in the supply of...

Deepfakes can be a serious business security threat

Employees of the vast majority of businesses say the manipulation of online content and media such as deepfakes poses a serious security threat to...

Inexperienced hackers actively attack OT systems

Unprofessional hackers, mainly for financial gain, have begun to actively attack Internet-connected operational technology (OT) systems. The media regularly reports on attacks on the process...

Experts

Cyber Threat Intelligence Home Page

How Hackers Used Slack to Break into EA Games

0
The hackers requested a multifactor authentication token from EA IT through Slack to access the corporate network. The cybercriminal group, which stole over 780 gigabytes of confidential...
Cyber Threat Intelligence Home Page

How a single cloud computing customer caused half the internet to go dark

0
On Tuesday, June 8, more than a dozen social networks and major international media sites crashed. As it became known, the disconnection of most of the...

News

Events

US Department of Justice equates investigations of ransomware attacks with investigations of terrorism

The US Department of Justice will equate investigations into ransomware cyberattacks with investigations of terrorism. According to Reuters, internal guidelines sent out by the Justice Department to US Attorney General's offices across the country say that local ransomware investigations should be centrally coordinated with a newly formed working group in Washington. “This is a dedicated process to track all ransomware use cases, no matter where in the country, so you can connect the attackers and work...

Technologies

Cyber Threat Intelligence Home Page

ReversingLabs Malware Lab

0
ReversingLabs Malware Lab is a solution for detecting, classifying and responding to malicious files.  ReversingLabs Malware Lab is designed specifically for today's cybersecurity organizations that...
Cyber Threat Intelligence Home Page

Qualys CyberSecurity Asset Management

0
Qualys CyberSecurity Asset Management is a multifunctional all-in-one security solution.  Using the capabilities of the Qualys Cloud Platform with multiple embedded sensors and CMDB (Configuration...
Cyber Threat Intelligence Home Page

Eclypsium

0
Eclypsium is an enterprise device integrity platform.  This includes traditional networking equipment such as switches, routers, VPNs, application delivery controllers, NAS, and personal and unmanaged...
Cyber Threat Intelligence Home Page

1Password

0
1Password is a tool to securely store passwords. Password Manager provides an easy and secure way to share your login information, passwords, credit card information...
Cyber Threat Intelligence Home Page

WatchGuard Endpoint Security

0
WatchGuard Endpoint Security includes a wide range of extensible solutions to prevent breaches, data theft and cyber-attacks.  It is a cloud-based platform that brings together...
Cyber Threat Intelligence Home Page

Huawei founder calls on company to develop open source software

0
Ren Zhengfei, the founder of Chinese tech giant Huawei Technologies, called on the company's employees to “dare to lead the world” in software. According...