In the News | Anomali

February 11, 2021  |  The Washington Post, Tonya Riley

The Cybersecurity 202: New voting machine security standards are already drawing controversy

They tricked United Arab Emirates government employees into opening links and attachments that installed remote desktop software, researchers from Anomali said. The researchers said that “it is very likely that data theft is the primary objective” of the campaign.
Read More

February 10, 2021  |  The Hacker News, Ravie Lakshmanan

Iranian Hackers Utilize ScreenConnect to Spy On UAE, Kuwait Government Agencies

Attributing the operation to be the work of Static Kitten (aka MERCURY or MuddyWater), Anomali said the "objective of this activity is to install a remote management tool called ScreenConnect (acquired by ConnectWise 2015) with unique launch parameters that have custom properties," with malware samples and URLs…
Read More

January 11, 2021  |  Forbes, Forbes Council

This CEO Sees Metrics As Key To Optimizing Cybersecurity Spending

While demand for cybersecurity products and services continues to grow overall, it’s currently moving at a slower pace than it was before the pandemic. Gartner recently forecasted global IT spending will decrease 8% from 2019 to 2020, as CIOs prioritize “mission-critical” IT spending over growth and…
Read More

November 24, 2020  |  Channel Life

Cybermerc launches AU cyber threat intelligence platform, AUSHIELD

AustCyber and Cybermerc have unveiled the country’s national threat intelligence sharing platform, dubbed AUSHIELD Defend. The platform, which was funded by the federal government and aligns with the 2020 Cyber Security Strategy, is designed to help businesses and research organisations defend themselves against cyber…
Read More

November 23, 2020  |  SecurityWeek, AJ Nash

Choosing the Right Threat Intelligence Mix

Recently, Gartner published its annual report about the threat intelligence market, which identified numerous products and services vendors competing in the space. Beyond Gartner, IT-Harvest, Frost & Sullivan, Forrester, ESG and many others also do a considerable amount of market watching and reporting about the latest…
Read More

November 23, 2020  |  Security Week, AJ Nash

Choosing the Right Threat Intelligence Mix

Recently, Gartner published its annual report about the threat intelligence market, which identified numerous products and services vendors competing in the space. Beyond Gartner, IT-Harvest, Frost & Sullivan, Forrester, ESG and many others also do a considerable amount of market watching and reporting about the latest…
Read More

November 16, 2020  |  Politico, Martin Matishak

The More the Merrier

Anomali and OneFirewall are the latest companies to join the Cyber Threat Alliance, bringing the non-profit organization’s membership to 28. “Both companies will bring their unique perspectives and data sources to the Alliance, further expanding and diversifying the information shared within CTA,” Michael Daniel,…
Read More

November 12, 2020  |  Data Breach Today, Tom Field

The Power of Actionable Threat Intel

The lack of automation and actionable threat intelligence may be preventing enterprises from developing the fully functional Cyber Fusion Centers they envision. Anomali's Mark Alba shares ideas on how to change that. Alba is Chief Product Officer at Anomali, joining the company in April 2020. Mark has over 20 years of…
Read More

November 9, 2020  |  EM360 Tech

Top 10 Threat Intelligence Platforms

Cybercrime and data breaches are a constant concern for today's growing businesses. Whether you're a small venture or a large enterprise, no organisation can afford to fall victim to an attack. Unfortunately, as the threats grow more complex, today's businesses often struggle to ensure they're fully protected.
Read More

October 31, 2020  |  SC Media, SC Media

Anomali Product Review

Anomali correlates millions of indicators of compromise against real-time network activity logs and forensic data to detect and identify adversaries early in the kill chain. This product combines automated intelligence collection, curation, and enrichment to make threat intelligence readily available to security teams.
Read More