Remove how-to-use-ip-geolocation-in-threat-intelligence-and-cybersecurity
article thumbnail

How to Use IP Geolocation in Threat Intelligence and Cybersecurity

Heimadal Security

Just last week, Google warned of a phishing scam perpetrated by Fancy Bear, a hacking group associated with the GRU, Russia’s military intelligence organization. LinkedIn was used to perpetrate a OneDrive phishing scam, and Zoom has been shown to be […].

Scams 94
article thumbnail

APT trends report Q3 2022

SecureList

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. Readers who would like to learn more about our intelligence reports or request more information on a specific report, are encouraged to contact intelreports@kaspersky.com.

Malware 139
article thumbnail

HYAS Product Enhancements – Part 1 – February 2024

Security Boulevard

February Product Release News If you’ve been following HYAS or using a HYAS cybersecurity solution, you know that HYAS is unique among Protective DNS providers. And so far in 2024, there has been a notable uptick in how we’re borrowing from one product to improve the other to deliver on some pretty incredible new features.

DNS 49