Threat Hunting to Catch Adversaries, Not Just Stop Attacks | Threatpost
We need to evolve threat hunting into a pursuit of adversaries. The threat hunting practice has helped security teams detect and reduce dwell time of Read More
We need to evolve threat hunting into a pursuit of adversaries. The threat hunting practice has helped security teams detect and reduce dwell time of Read More
Though lots of people might be taking some time off over the Labor Day weekend, threat actors likely won’t — which means organizations should remain Read More
Services that allow consumers to resell their own internet bandwidth for profit to businesses that want to resell it are ripe for abuse, according to Read More
Looking for work? Speak fluent English? Capable of convincingly portraying a professional – as in, somebody a highly ranked corporate leader would talk to? If Read More
After Bangkok Airways disclosed that it had been clobbered by a cyberattack last week, the LockBit 2.0 ransomware gang tossed its own countdown clock in Read More
Researchers discovered a novel ransomware emerging on the heels of the ProxyShell vulnerabilities discovery in Microsoft Exchange servers. The threat, dubbed LockFile, uses a unique Read More
The LockBit ransomware gang has apparently struck again, having purportedly stolen 103GB worth of files from Bangkok Airways and promising to release them tomorrow, on Read More