SC Magazine

After takedown, are Avalanche and its malware families buried?

Global authorities' takedown of Avalanche, a cybercriminal network whose malware and money laundering campaigns are estimated to have cost victims in over 180 countries hundreds of millions of dollars, was an achievement four years in the making – and yet the saga is far from over.International law enforcement agencies and...

Read More
IT Security Guru

Detection Gaps – An Inconvenient Truth

Corporate security teams face numerous challenges. They need to adapt to an increasing number of sophisticated attacks and at the same time, abide by strict business processes and controls. This can impede rapid adoption of new security solutions or changes to existing ones, with organisations cautious of updating these systems...

Read More
Risk Management

Terror Tech

Recent terrorist attacks both in the United States and abroad have underscored the need for tools and strategies that can anticipate and mitigate the dangers of terrorism—whether attacks occur on city streets, in workplaces, at social gatherings, or online in the form of cyberattacks on corporate or government...

Read More

Anomali Debuts Free Tool for STIX/TAXII Threat Intelligence Feeds

Anomali's New STAXX cyber-threat intelligence offering aims to help fill the void left from the shutdown of the Soltra Edge software effort.Security firm Anomali announced on Nov. 21 the debut of its new free STAXX tool to receive threat intelligence feeds.In the world of threat feeds, STIX (Structured...

Read More

Surveys: Security Pros Overwhelmed, Not Communicating, Threat Intel Data

Two new surveys released in the last week revealed troubling but telling trends in enterprise security: 70 percent of infosec professionals are overwhelmed by the volume and complexity of threat intelligence data, according to a report from security vendor Anomali and the Ponemon Institute; a separate survey from consultancy BDO USA...

Read More

What we can (and can’t) learn from the latest Shadow Brokers dump

While the Shadow Brokers’ most recent stunt of leaking an old list of supposed NSA staging server may reveal tactics, tools and procedures once used by some of the country’s most elite hackers, the newly released evidence can be easily disputed, experts say.Shortly after Monday&rsquo...

Read More

Flood of threat intelligence overwhelming for many firms

The amount of threat information coming in from security systems is overwhelming for many companiesThree years after Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still overwhelming for many companies, according to new reports, due to...

Read More

Organizations Feel Bogged Down By Security Threats

Millions of businesses and other organizations now recognize the serious threat they face from mismanaging their sensitive data or being attacked. However, many companies don't do enough to adequately protect their IT infrastructure and keep up with the latest cybersecurity trends, in part because they feel inundated by this...

Read More

Too Much Threat Data Hinders Cybersecurity Efforts

Take a look at some of these numbers from Symantec’s 2016 Internet Security Threat Report. In 2015, Symantec discovered more than 400 million new pieces of malware, an increase of 36 percent over 2014. On average, there was one new zero-day vulnerability found each week. Approximately a half billion records were compromised. Ransomware...

Read More
eSecurity Planet

73 Percent of Security Pros Aren’t Using Threat Intelligence Data Effectively

According to the results of a recent survey of 1,072 security industry professionals, 73 percent of respondents admit they aren't using threat data effectively to pinpoint cyber threats.The top reasons for that lack of effectiveness include lack of staff expertise (69 percent of respondents), lack of ownership (58 percent), and lack of...

Read More