threat detection

As fraud attacks grow more sophisticated, a need for contextual detection strategies increases
Fraudsters are using a complex array of tools to build armies of fake accounts, 74% of all fraudulent accounts are created from desktops, and cloud service provider IP ranges …

What worries you the most when responding to a cybersecurity incident?
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. The majority (59 percent) of companies are …

Attack traffic increased by 32 percent in 2018
Attack traffic observed by F-Secure’s network of decoy honeypots in 2018 increased by 32 percent over the previous year and increased fourfold in the latter half of 2018 …

How malware traverses your network without you knowing about it
A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …

Detecting Trojan attacks against deep neural networks
A group of researchers with CSIRO’s Data61, the digital innovation arm of Australia’s national science agency, have been working on a system for run time detection of trojan …

Product showcase: Veriato Cerebral user & entity behavior analytics software
When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace …

Deception technology: Authenticity and why it matters
This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article …

An introduction to deception technology
This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …

It only takes one data point to blow open a threat investigation
Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s …

Fooling security tools into believing malicious code was signed by Apple
The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security …

Microsoft to provide Windows Defender ATP for older OS versions
Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. …

Researchers showcase automated cyber threat anticipation system
A group of researchers is trying to develop an automatic early warning system that should help defenders take preventative action before specific cyber attacks start …
Featured news
Resources
Don't miss
- CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
- Windows 11 quick machine recovery: Restoring devices with boot issues
- Two things you need in place to successfully adopt AI
- Exegol: Open-source hacking environment
- Only 2-5% of application security alerts require immediate action