ransomware landscape, defenders, cybersecurity ransomware

Making Sense of the 2023 Ransomware Landscape

Understanding the current ransomware landscape is the first step to helping defenders protect their organizations ...
Security Boulevard
Meet Hackie-AI, The New Kid on the Block.

Meet Hackie-AI, The New Kid on the Block.

Meet Hackie-AI, The New Kid on the Block.2 min read·Just now--Seeing global hackers on Interpol, FBI, and Scotland Yard’s top ten list may soon become a thing of the past. Replacing the ...
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia

Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia

Executive Summary  EclecticIQ analysts identified a cyber espionage campaign where threat actors used a variant of HyperBro loader with a Taiwan Semiconductor Manufacturing (TSMC) lure, likely to target the semiconductor industry in ...
[AlienVault +D3 Smart SOAR] Automate Your Security Alerts

Automated Incident Response with AlienVault and Smart SOAR

Open-source threat intelligence (OSINT) is a valuable asset to pull from during incident investigations. However, doing this for every alert is monotonous and can be prone to human errors. When using SOAR ...
OT Attack Path Analysis: A Comprehensive Guide

OT Attack Path Analysis: A Comprehensive Guide

| | FEATURED, ICS, OT, Threat Intelligence
The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware ...
telecom, threat actors

Cyberthreat Intelligence: Are Telecom Networks Easy Targets?

Threat actors are trying to breach telecom service providers' networks and gain access to sensitive data ...
Security Boulevard
Fundamentals of attack path analysis in an OT environment

Fundamentals of attack path analysis in an OT environment

| | FEATURED, ICS, OT, Threat Intelligence
At its core, an attack path analysis presents a powerful visual and impactful representation covering a potential path that cyber threat actors or malicious payloads may tread to breach asset or network ...
ASM, CTI,

Battling Cybercrime by Combining ASM With CTI

Organizations are increasingly turning to attack surface management (ASM) and cyberthreat intelligence (CTI) as essential components of their cybersecurity programs ...
Security Boulevard
shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Cybersecurity the Biggest Challenge for Smaller Organizations

A survey identified cybersecurity as the biggest challenge small organizations face today, with 49% more concerned than they were six months ago ...
Security Boulevard
stackCast powered by stackArmor

stackCast Episode #3: Stephen de Vries, CEO at IriusRisk

On a new episode of stackCast (powered by stackArmor), host Martin Rieger, Chief Solutions Officer & CISO at stackArmor, welcomes the CEO at IriusRisk, Stephen de Vries. The two discuss: What threat ...