Posts tagged Threat Intel

3 min Threat Intel

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

The Rapid7 Threat Intelligence team is tracking the attacker's-eye view on Log4Shell and the related chatter on the clear, deep, and dark web.

3 min Threat Intel

Deepfakes: A Nascent Cybersecurity Threat

There's one cybersecurity threat trend in particular we think is worth watching out for: deepfakes.

3 min SOAR

Better Together: XDR, SOAR, Vulnerability Management, and External Threat Intelligence

Effectively prioritizing security incidents comes down to having the right data and intelligence from inside your IT environment and the world outside.

5 min Threat Intel

4 Simple Steps for an Effective Threat Intelligence Program

By following these simple steps, you can implement an effective threat intelligence program that's built for the modern cybersecurity environment.

3 min Detection and Response

SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal

The SANS Institute has conducted its sixth annual Threat Hunting Survey. Read this post for a preview of the survey's findings and its takeaways.

4 min Threat Intel

SANS Experts: 4 Emerging Enterprise Attack Techniques

According to a report from the SANS Institute, the new wave of attack techniques isn't on the horizon — it’s here.

5 min Cybersecurity

[R]Evolution of the Cyber Threat Intelligence Practice

Threat intelligence is transitioning from a separate pillar to a central hub that feeds all the functions of the security organization.

4 min Threat Intel

What It Was Like to Attend Black Hat USA 2021 and DEF CON 29 in Person

I attended Black Hat USA 2021 and DEF CON 29, marking the fifth time that I made this annual pilgrimage to Las Vegas for cybersecurity professionals.

2 min Threat Intel

Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement

Any new security regulation attracts the attention of fraudsters and cybercriminals. It’s safe to assume they're able to bypass SCA.

3 min Threat Intel

The CISO as an Ethical Leader: Building Accountability Into Cybersecurity

It’s important that cybersecurity leaders reinforce ethical practices in guarding against data loss.

3 min Threat Intel

Colonial Pipeline Wasn’t the First, the Last, or the Worst of Critical Infrastructure Cyberattacks

The energy, utilities, and industrials vertical has long been a significant target for criminals and state-sponsored threat actors.

3 min Threat Intel

Insider-Assisted Attacks Prove Costly for Telecoms

Here are some instances in which telecom companies were breached with the help of an insider.

3 min Threat Intel

Sending the All-Clear Signal: The Implications of WhatsApp’s New Data Privacy Policy

Popular messaging app WhatsApp announced new data privacy policy changes set to debut on February 8, much to the chagrin of its massive user base.

3 min Threat Intel

3 Security Regulations Automotive Companies Need to Know

A Rapid7 research report breaking down the cyber threat landscape in the automotive industry shows cyberattacks in the sector have risen rapidly.

2 min Threat Intel

Leaked YouTube Credentials Growing in Popularity on Dark Web Forums

Rapid7 researchers have observed a new trend in black markets and cybercrime forums: stolen credentials for prominent YouTube accounts.