Remove category threat-modeling
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Trail of Bits released a threat model for Kubernetes. Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. There’s some context from Aaron Small, who made the project happen.

189
189
article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

This is written jointly with Tim Peacock and will eventually appear on the GCP blog. In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response. and matters a lot.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Basta ransomware now supports encrypting VMware ESXi servers

Security Affairs

Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model. . Researchers from NCC Group recently spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Pierluigi Paganini.

article thumbnail

Black Basta ransomware operators leverage QBot for lateral movements

Security Affairs

Researchers from NCC Group spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model. . exe: regsvr32.exe Pierluigi Paganini.

article thumbnail

CTEM: The First Proactive Security Innovation in 20 Years

NopSec

Brad LaPort , a veteran Gartner analyst and I were on a content project, talking about why the market was missing out on a new category to encapsulate the disparate exposure data and derive actionable insights. Then the conversation carried on with Mitchell Schneider , a prominent Gartner analyst covering Threat and Vulnerability Management.

article thumbnail

GUEST ESSAY: Threat hunters adapt personas, leverage AI to gather intel in the Dark Web

The Last Watchdog

These automated programs will hunt the Deep & Dark Web for you, trawling through the deepest and dirtiest pools, looking for the next threat that has your name on it. Hunting threats. Staying on top of the latest threats can feel overwhelming, but there is no need to be cyber paralyzed. Databases with critical IP and/or PII.

article thumbnail

Where Does Shared Responsibility Model for Security Breaks in the Real World?

Anton on Security

Shared responsibility model for cloud security is the fundamental concept?—?perhaps This blog is basically an alpha version for a future blog on how we are evolving and improving the shared responsibility model shortcomings with our shared fate model , but this one only has the challenges, and not the solutions.

Risk 100