Remove category threat-modeling
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Trail of Bits released a threat model for Kubernetes. Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. There’s some context from Aaron Small, who made the project happen.

189
189
article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

This is written jointly with Tim Peacock and will eventually appear on the GCP blog. In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response. and matters a lot.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Basta ransomware now supports encrypting VMware ESXi servers

Security Affairs

Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model. . Researchers from NCC Group recently spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Pierluigi Paganini.

article thumbnail

Black Basta ransomware operators leverage QBot for lateral movements

Security Affairs

Researchers from NCC Group spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model. . exe: regsvr32.exe Pierluigi Paganini.

article thumbnail

CTEM: The First Proactive Security Innovation in 20 Years

NopSec

Brad LaPort , a veteran Gartner analyst and I were on a content project, talking about why the market was missing out on a new category to encapsulate the disparate exposure data and derive actionable insights. Then the conversation carried on with Mitchell Schneider , a prominent Gartner analyst covering Threat and Vulnerability Management.

article thumbnail

GUEST ESSAY: Threat hunters adapt personas, leverage AI to gather intel in the Dark Web

The Last Watchdog

These automated programs will hunt the Deep & Dark Web for you, trawling through the deepest and dirtiest pools, looking for the next threat that has your name on it. Hunting threats. Staying on top of the latest threats can feel overwhelming, but there is no need to be cyber paralyzed. Databases with critical IP and/or PII.

article thumbnail

Zyxel addresses four flaws affecting APs, AP controllers, and firewalls

Security Affairs

The vendor has already released security patched to address the flaws for most of the affected models. This advice is especially important for US companies as we head into a holiday weekend when it is common for threat actors to conduct attacks. To nominate, please visit:?. Follow me on Twitter: @securityaffairs and Facebook.

Firewall 127