Blog

Category: Cyber Threat Intelligence

2017 Cyber Security Predictions

2016 has now come to an end and a new set of security predictions are being revealed. The past year has been a whirlwind tour of challenges and changes in the cybersecurity landscape. Targeted threat activity took on a new emphasis by focusing on both disinformation and weaponized, confidential information. Ransomware...

Read More

Anomali Weekly Threat Intelligence Briefing - December 29, 2016

Trending Threats This section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs. Figure 1: IOC Summary Charts. These charts summarize the IOCs attached...

Read More

Locky Ransomware Shifts to .OSIRIS Extension

Locky ransomware continues to evolve and has again changed the filename extension used to encrypt files. This time using the file extension “.osiris” on all files it encrypts.Locky will encrypt image files found on the system leaving them inaccessible unless the ransom is paid to acquire the...

Read More

More On Detection Gaps…

How often have we seen a security news headline detailing a new malware strain or exploit kit campaign? The next question for security teams will usually be, do we detect that? In today’s threat landscape, delivery methods and network traffic patterns that are detected at present will eventually...

Read More

Ponemon Study: Challenges of Threat Intelligence

A new study by the Ponemon Institute highlights the difficulties in taking advantage of threat intelligence. The study of over a thousand IT security practitioners in North America and the United Kingdom notes particular difficulties in consuming threat intelligence due to the extensive amount and complexity of threat data. Seventy...

Read More

SymHash: An ImpHash for Mach-O

In the past the Windows Portable Executable (PE) format has been analyzed far and wide due to the historical large scale adoption of the platform. In contrast the Mach-O binary format (executable file format used by MacOS X, IOS, and other Mach based systems) has received much less attention. This...

Read More

Measuring Cybersecurity Risks

There is no question that the web has changed the way we do business and conduct personal affairs. The power of high speed calculations and instant communication have enabled incredible developments. The technical landscape has also furnished the conditions for advanced means of sabotaging, stealing or otherwise exploiting others’...

Read More

5 Similar Components Of The Top Cyber Threat Intelligence Companies

Entrusting your network to a cyber-security platform is an investment and commitment. With all that is at stake in the event of a cyber-security crisis, it is a decision worth researching. Not all cyber threat intelligence companies have the same capabilities. Most vendors offer packages suitable to your organizations needs...

Read More

What Is A Global Threat Assessment?

What does global politics have to do with enterprise cyber-security? World affairs affect you and your network a lot, actually. Intercontinental cybercrime on the macro level directly affects domestic affairs. Individual hacking victims comprise the mosaic of international espionage.What is the state of global cyber-threats? Just as the Internet...

Read More

The Best Threat Intelligence Feeds

When it comes to choosing software platforms for your organization, it's important to choose wisely. Not all cyber-security suites are created equally. Consider all that is riding on the sanctity of your network security. Hackers need only to be successful once in order to gain access to and exploit...

Read More
Register for a Free Anomali Account Register now