Applying Threat Intelligence to Iranian Cyberattack Risk

Credit to Author: J.J. Thompson| Date: Wed, 15 Jan 2020 13:01:37 +0000

As geopolitical interest increases, discussions of threat intelligence increase which increases pressure on security operations teams to provide answers to customers and to senior leadership.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/pQqkg_WT2eU” height=”1″ width=”1″ alt=””/>

Read more

Compiling Open Source Threat Intelligence for Threat Hunts

Credit to Author: Mat Gangwer| Date: Wed, 15 Jan 2020 10:02:05 +0000

In addition to normal tradecraft adaptations, any time a change in the geopolitical landscape takes place, cyberattack campaigns and adversary behaviors typically shift as well. The recent events with Iran and the United States offer a relevant use case for organizations and have highlighted the benefit of having a threat intelligence driven hunting process. The [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SIgRbmduM5E” height=”1″ width=”1″ alt=””/>

Read more