News & Events

In the News

CSO Online

March 10, 2017  |  CSO Online, Ryan Francis,

Profiling 10 types of hackers

Hackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your...
Read More

SC Magazine

March 1, 2017  |  SC Magazine , Peter Stephenson

Anomali Threatstream receives 5-star rating and ‘Best Buy’ product

Anomali ThreatStream is a threat analysis SaaS platform that also has an on-premises option supplied as a virtual machine for those organizations that don't want to risk a cloud-based deployment. The tool includes over 140 open-source feeds and allows easy inclusion of commercial feeds through the Anomali APP Store. We...

SC Media

February 17, 2017  |  SC Media , Travis Farral

How the events of 2016 could shape the future of democratic elections

Travis Farral discusses the malicious activity that surrounded the US election, addressing Russian actors and examples of other Nation State hacking activity that enterprises can learn from.It's been hard to miss all of the rumours surrounding the recent US election, particularly the speculation surrounding Russia's involvement. Examples...
Read More

February 14, 2017  | 

Anomali Announces Cybersecurity Updates, Phishing Protection

Anomali announced a host of new updates to its threat intelligence platform on Monday, including the addition of a detection service to halt damaging email-based phishing attacks. Previously known as ThreatStream, Anomali provides a suite of Software-as-a-Service (SaaS) solutions that aim to pinpoint threat indicators in real-time. Anomali unveiled...
Read More

Bank of England

February 10, 2017  |  Bank of England, Bank of England

Bank of England works with Anomali to improve threat intelligence capabilities

​The Bank of England FinTech Accelerator recently ran a proof of concept looking at innovative technologies that collect, integrate, hunt and investigate cyber security intelligence data. Following the successful completion of this proof of concept, the Bank has decided to continue to work with Anomali to monitor and mitigate efforts...
Read More

CSOOnline

February 3, 2017  |  CSOOnline , CSO Staff

Hacking the 2016 Election: A Timeline

History has yet to judge the 2016 presidential election, but from where we sit in the early days of 2017, it’s hard to imagine that it will ever be relegated to a footnote.From how spectacularly polling failed to predict the election’s outcome to how the election was...
Read More

InformationAge

January 27, 2017  |  InformationAge, Nick Ismail

Nation State hacking: a long history?

Among the many scandals that pervaded the US election, the notion of state sponsored hacking was a theme that dominated candidate rhetoric and media coverage the most.Volatility and uncertainty parallel an era of innovation and opportunity. The US election brought this strange reality that the world finds itself in,...
Read More

TechTarget

January 11, 2017  |  TechTarget, Michael Heller

Insecure MongoDB configuration leads to boom in ransom attacks

Cybercriminals have found weaknesses in many MongoDB configurations that have opened the door to tens of thousands of ransom attacks.Niall Merrigan, security researcher and Microsoft developer based in Norway, has been tracking the MongoDB ransom incidents, and in one day, he saw the number of...
Read More

InfoSecurity Group

January 9, 2017  |  InfoSecurity Group, Tara Seals

Researchers: Brace for a Major Cloud Provider Compromise

The balkanization of the internet and the movement of data to the cloud will define the 2017 cybersecurity landscape, according to researchers—and we should brace for a major compromise of a cloud provider.Cloud-based methods of persistence and compromise have been presented at many security conferences, including BlackHat and...
Read More

Dark Reading

January 9, 2017  |  Dark Reading, Kelly Sheridan

DHS Designates Election Systems As Critical Infrastructure

The Department of Homeland Security has deemed the nation's voting system as part of its critical infrastructure, citing security reasons.The US Department of Homeland Security (DHS) has designated the nation's election system as part of its critical infrastructure, a status change it has been debating ...
Read More