Remove listing tags industry-trends
article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

As a bonus, many of these tools are free to access and have specialized feeds that focus on different industries and sectors. Additionally, dashboards share data about threat names, any relevant reference URLs, tags, adversary and malware families, and attack IDs.

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome. I hope you will read on, to learn more lessons learned about the network and the part two blog about Cisco Secure in the NOC. As mentioned elsewhere in this blog, this was a conference of APIs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT annual review 2021

SecureList

For this annual review, we have tried to focus on what we consider to be the most interesting trends and developments of the last 12 months. The list of targeted individuals includes 14 world leaders. On January 25, the Google Threat Analysis Group (TAG) announced a state-sponsored threat actor had targeted security researchers.

Malware 101
article thumbnail

Black Hat USA 2023 NOC: Network Assurance

Cisco Security

As the device now had TWO Wi-Fi profiles, it was now free to use its inbuilt prioritisation list (more details here ) ensuring that the device joined the more secure of the networks (802.1x The same script was then copied and amended to add tags to devices. So, to make this flexible, we use tags in Meraki Systems Manager speak.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

As we were scrapping it all and starting from scratch when starting with Kali, we moved to Git and used GPG to tag releases, at the same time, published all our build-scripts allowing anyone to build Kali on any platform. As these are for a limited time, as well as being handmade item, do expect the price tag to match it.

InfoSec 52
article thumbnail

Black Hat Asia 2022: Building the Network

Cisco Security

In part one of this issue of our Black Hat Asia NOC blog, you will find: . We were able to import the list of MAC addresses of the Meraki MRs, to ensure that the APs were named appropriately and tagged, using a single source of truth document shared with the NOC management and partners, with the ability to update en masse at any time.