BLOG

Category:

Weekly Threat Briefing

Anomali Weekly Threat Intelligence Briefing - May 23, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...
Read More

Anomali Labs Anomali Labs | May 23, 2017


STAXX

STAXX 2.3 is Here - Features New Anomali Limo Service

We're pleased to announce a major update to STAXX with version 2.3, which includes our brand new Anomali Limo service - a collection of free threat intelligence feeds. We're also pleased to announce Anomali Forum - a discussion board focused on cybersecurity and threat intelligence.Anomali LimoSince we...
Read More

Dan Barahona Dan Barahona | May 22, 2017


Anomali Enterprise ThreatStream

Anomali Opens New Office in Belfast, Ireland

One of the biggest challenges that comes with delivering a popular product is managing the associated growth. Anomali has experienced tremendous growth each year since its founding in 2013. As Anomali continues to grow in Europe, it only makes sense to increase our presence to serve that market.“Anomali has...
Read More

Travis Farral Travis Farral | May 18, 2017


Research

WanaCry: Frequently Asked Questions

There are many questions surrounding the WanaCry ransomware attack that started on May 12, 2017. In order to provide some quick answers to common questions and dispel some misconceptions, we are providing this list of frequently asked questions. We will keep this updated as new details emerge. For a more in-depth look...
Read More

Travis Farral Travis Farral | May 16, 2017


Weekly Threat Briefing

Anomali Weekly Threat Intelligence Briefing - May 16, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...
Read More

Anomali Labs Anomali Labs | May 16, 2017


Research

WanaCry Observations: Big Worm = Big Problems

NOTE: Anomali is continuing to investigate and monitor the WanaCry worm and will update this page as we have more information to share. Visit www.anomali.com/wanacry for the latest.On the morning of Friday May 12th a new ransomware threat emerged infecting tens of thousands of computers across...
Read More

J. Gomez J. Gomez | May 14, 2017


Threat Intelligence Platform

Maximizing the Potential of Open Source Threat Intelligence Feeds

Open source feeds are a popular and abundant source of threat intelligence indicators. These feeds originate from a variety of sources- companies, special projects, honeypots, individual contributors, and more. There are hundreds to choose from, providing a vast reserve of millions of indicators of compromise (IOCs) that can be ingested...
Read More

Payton Bush Payton Bush | May 11, 2017


Weekly Threat Briefing

Anomali Weekly Threat Intelligence Briefing - May 9, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...
Read More

Anomali Labs Anomali Labs | May 9, 2017


Research STAXX

STIX/TAXII: All Your Questions Answered

What are they?STIX/TAXII are community-driven standards and protocols for sharing cyber threat intelligence. Technically speaking, STIX and TAXII are not sharing programs, tools, or software, but rather components and standards that support them. STIX states the what of threat intelligence, while TAXII defines how that information is relayed....
Read More

Payton Bush Payton Bush | May 4, 2017


Research

Why Brand Monitoring is a Security Issue - Compromised Credentials

Corporate brands are generally thought of as intangible objects that carry the company’s image and reputation. However, your brand is very tangible in the eyes of attackers and can absolutely be targeted and damaged with cyber threats. To prevent such damage, companies can engage in “brand monitoring...
Read More

Payton Bush Payton Bush | May 3, 2017


Get the latest threat intelligence news in your email.