All Posts
Cyber Threat Intelligence
Threat Intelligence Platform
ThreatStream
1
min read

Anomali at RSA Conference 2018

RSA Conference 2018 has been full of announcements, presentations, fun and a prestigious award. Learn more....
Published on
April 19, 2018
Table of Contents
<p>It’s the last day of <a href="https://www.rsaconference.com/events/us18?mkt_tok=eyJpIjoiTlRKa1l6TmxaRFJqWm1ZMCIsInQiOiJWVlIwSHp6UUJrbUlvemczY0xsNjVBOWhOSHJYZk5FS1dHVEx0aVRjWHJBbnpnY21GbnBFYzZsTGZCMGZhd3BLVmwwNjdzQlhcL2FnT1JSN1ZoMVJCU3c9PSJ9" target="_blank">RSA Conference 2018</a>, and what a week it’s been!</p><h3>We made a few announcements....</h3><p>We’re <a href="https://www.anomali.com/news-events/press/anomali-announces-collaboration-with-microsoft-providing-customers-with-unique-insights-into-their-threat-data">collaborating with Microsoft Intelligent Security Graph (ISG)</a> to bring new security insights into threat data for joint customers. The integration pairs threat intelligence from Anomali with security alerts from Microsoft’s global ecosystem.</p><p><img alt="" src="https://cdn.filestackcontent.com/mESB8czOQMmABt2x2IL8"/></p><p>We’re <a href="https://www.anomali.com/news-events/press/anomali-partners-with-visa-to-offer-global-payment-breach-intelligence">partnering with Visa</a> to offer global payment breach intelligence. Visa works with merchants whenever a breach occurs to investigate and understand what’s transpired. This information will now be available in the <a href="https://www.anomali.com/products/threatstream">Anomali ThreatStream</a> platform through the Visa Threat Intelligence feed.</p><p>We’re <a href="https://www.prnewswire.com/news-releases/grant-thornton-and-anomali-collaborate-on-threat-intelligence-solutions-300630965.html" target="_blank">allying ourselves with Grant Thornton LLP</a> to provide Grant Thornton clients with a suite of threat intelligence capabilities and counseling for solution design and engineering.</p><h3>We won an award....</h3><p>Anomali was named <a href="http://www.cyberdefensemagazine.com/infosec-awards-2018-winners/" target="_blank">Best Product in Threat Intelligence</a> by Cyber Defense Magazine's 2018 InfoSec Awards.</p><p><img alt="" src="https://cdn.filestackcontent.com/6WqJRkaqRfiIbj7NB3lF"/></p><h3>We gave a few presentations....</h3><p>Two of our best and brightest Sales Engineers, Brian Roy and Teddy Powers, presented <em>The Art of Collaboration: STIX and STAXX</em> at the Oasis Booth. </p><p><img alt="" src="https://cdn.filestackcontent.com/5GwMiDhGQxiwLTs6CwwY"/></p><p>Our Director of Security Strategy, Travis Farral, also spoke about <a href="https://www.darkreading.com/practically-applying-threat-intelligence-to-your-business/v/d-id/1331580" target="_blank">practically applying threat intelligence to your business</a>.</p><h3>We had a bit of fun...</h3><p>Last night we ran away and joined the circus with <a href="https://www.exabeam.com/" target="_blank">Exabeam</a> for a thrilling night of food, drinks and entertainment. Thanks to all who attended The Night Circus!</p><p><img alt="" src="https://cdn.filestackcontent.com/77FwfKqQQEC2z3CgL53N"/></p><h3>And we're still looking to give something away...</h3><p>Last but not least, it’s not too late to qualify for our giveaway, a Yamaha Raptor 700R SE! To enter for a chance to win simply:</p><ul><li>Stop by booth #2007 and watch two demos </li><li>Leave us your business card</li><li>Be present at 1:05 PM for the drawing</li></ul><p><img alt="" src="https://cdn.filestackcontent.com/bpLLuGrGQM2mf9TvYCQQ"/></p>

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All