Applying Threat Intelligence to Iranian Cyberattack Risk

Credit to Author: J.J. Thompson| Date: Wed, 15 Jan 2020 13:01:37 +0000

As geopolitical interest increases, discussions of threat intelligence increase which increases pressure on security operations teams to provide answers to customers and to senior leadership.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/pQqkg_WT2eU” height=”1″ width=”1″ alt=””/>

Read more

High-profile events are opportunities to determine security readiness

Credit to Author: Chester Wisniewski| Date: Wed, 15 Jan 2020 10:00:38 +0000

While the likelihood you might be targeted by a nation-state is low, preparing for such a circumstance might still be a useful strategy<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/mlgSNlflJNI” height=”1″ width=”1″ alt=””/>

Read more

Information operations on Twitter: new data released on election tampering

Credit to Author: Christopher Boyd| Date: Thu, 18 Oct 2018 15:00:00 +0000

New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.

Categories:

Tags:

(Read more…)

The post Information operations on Twitter: new data released on election tampering appeared first on Malwarebytes Labs.

Read more