Is Threat Intelligence Garbage?
Dark Reading
MAY 23, 2018
Most security professionals in a recent survey said that threat intelligence doesn't work. So why all the hype?
Dark Reading
MAY 23, 2018
Most security professionals in a recent survey said that threat intelligence doesn't work. So why all the hype?
Anton on Security
SEPTEMBER 7, 2023
This post is our first installment in the “Threats into Detections — The DNA of Detection Engineering” series, where we explore opportunities and shortcomings in the brand new world of Detection Engineering. On the security side, detection engineers need to be able to identify and understand the latest threats and attack techniques.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Threatpost
AUGUST 9, 2021
The biggest challenge for security teams today is the quality of the threat intelligence platforms and feeds. How much of the intel is garbage and unusable? Threat intelligence process itself spans and feeds into many external and internal systems and applications.
eSecurity Planet
FEBRUARY 10, 2022
Security information and event management (SIEM) technology provides foundational support for threat detection. While a properly configured SIEM can provide effective threat protection, misuse of SIEM technology can increase costs and undermine security. See our in-depth look at the top SIEM tools. What is a SIEM? How to Use a SIEM.
Security Boulevard
OCTOBER 2, 2022
Are we going to face a quantum threat in the future, yes? Will the quantum attacker be powered by deep learning artificial intelligence membranes that eat machine learning algorithms for breakfast? Recycling data and wiping away the garbage file. Hiring Data Recycling Security Engineers Smart? Being secure is everything!
Security Affairs
OCTOBER 31, 2020
Threat actors are attempting to take advantage of the Halloween festivities, a recent Emotet malware campaign spotted by BleepingComputer employed spam emails that invite recipients to a Halloween party. The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.
SC Magazine
MAY 7, 2021
While it’s fairly common to find malware written in C, C+, Python and Java, threat actors have also been known to experiment with more obscure languages as a means to stay ahead of detection and forensics. But “it is unusual to see common malware written in a completely different way,” according to a blog post this week from Proofpoint.
Let's personalize your content