• Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    In the realm of cybersecurity, threat attribution is akin to the investigative methods of the legendary detective Sherlock Holmes. Just as Holmes used his acute observation skills and deductive reasoning to pinpoint the perpetrator in a mystery, threat attribution involves meticulously analyzing cyberattacks to trace their origins and identify the attackers. In his classic form,…

  • The OSINT Impact on Modern Cybersecurity Practices

    The OSINT Impact on Modern Cybersecurity Practices

    Think about the thousands of artifacts and clues that a team of archeologists excavate and examine to construct a coherent narrative of past civilizations. Each artifact serves as a clue that provides a snippet of insight into how the people of that time lived. Digging up small artifacts in this matter is still being conducted…

  • Living-off-the-Land: How Attackers Blend into Traffic

    Living-off-the-Land: How Attackers Blend into Traffic

    “Living off the land” is a strategy employed to discreetly achieve a dubious aim. Think about a couple of wedding crashers. Dressed impeccably, they blend in seamlessly with legitimate guests, indulging in the spread and avoiding direct contact with the newlyweds who might identify them as illegitimate guests. Similarly, a hiker in the wilderness becomes…

  • Cobalt Strike – From Tool to Trap – When Malice Wields the Weapon

    Cobalt Strike – From Tool to Trap – When Malice Wields the Weapon

    It is a classic movie theme: a weapon of great power or mass destruction falls into the wrong hands. Many a James Bond film has used that script and it has proved to be a winning one. Unfortunately, it has also become a common script when it comes to cybersecurity in which hackers and financially…

  • Unveiling the Unsung Hero: The Power of Threat Intelligence

    Unveiling the Unsung Hero: The Power of Threat Intelligence

    Let’s say you’re going on vacation next week to a foreign country. You need to know the weather so you can pack appropriately. You open a weather app, enter your destination, and see that it will be warm, but there’s a slight chance of rain, so you throw an umbrella into your bag. Behind the…

  • Security-Focused Patching Best Practices

    Security-Focused Patching Best Practices

    As cyber threats become more sophisticated and prevalent, organizations of all sizes face an ever-increasing risk of becoming victims. That isn’t hyperbole. Check Point Research found that cyberattacks increased by 38% in 2022, compared to 2021, and weekly attacks increased by 7% in the first quarter of 2023 compared to the same quarter in 2022. While businesses must…

Loading

Sign Up for Updates