Blog

WAYS TO MAINTAIN YOUR CYBERSECURITY INFRASTRUCTURE

Network security is a great undertaking early on. The benefits to protecting your network are immediate as well as beneficial in the long term. However, the systems and practices which defend your organization and its network are not a “set it and forget it” machine. As threats are...

Read More

Weekly Threat Intelligence Briefing - March 28, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Machine Learning for Cybersecurity

Sam Charrington, host of Machine Learning & Artificial Intelligence (TWiML & AI) podcast and Evan Wright Principal Data Scientist at Anomali discuss a number of topics surrounding the use of machine learning in cybersecurity. These topics include: ​ The three big problems in cybersecurity that Machine...

Read More

Doing Threat Intel The Hard Way - Part 6: Threat Intelligence Maintenance

This is the sixth and final post in a series on manual IOC management for threat intelligence. See the previous posts:Part 1: Manual IOC Management Part 2: Capturing Threat Intelligence Part 3: Processing Threat Intelligence Part 4: Operationalizing Threat Intelligence Part 5: Analyze Threat IntelligenceThreat intelligence MaintenanceOnce an analyst has decided on...

Read More

Anomali Weekly Threat Intelligence Briefing - March 21, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Teach A Man to Phish

In the world of credential theft, phishing continues to be a popular method of attack. All that a cybercriminal needs to start are saved and modified login pages of a web site and some clever social engineering. Once the desired page is set up (often using throw-away or compromised domains)...

Read More

Anomali Weekly Threat Intelligence Briefing - March 14, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Doing Threat Intel the Hard Way - Part 5: Analyze Threat Intelligence

This is the fifth post in a series on manual IOC management for threat intelligence. See the previous posts:Part 1: Manual IOC Management Part 2: Capturing Threat Intelligence Part 3: Processing Threat Intelligence  Part 4: Operationalizing Threat Intelligence Analyze Threat IntelligenceEverything we have discussed to this point...

Read More

Anomali Weekly Threat Intelligence Briefing - March 7, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Why A Computer Beating Poker Pros Is Great News for Cybersecurity

Use of Machine Learning (ML) is a hot topic in cybersecurity, one which will undoubtedly shape the industry for years to come. To see evidence of this we’d have to look no further than the booths at this most recent RSA Security Conference, where ML was promised as...

Read More
Register for a Free Anomali Account Register now