Loading...


Internet Security Directory
Dark Reading: Threat Intelligence

-

Dark Reading: 5 Ways The Cyber-Threat Landscape Shifted In 2016

Votes:22 Comments:0
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016 12/19/2016 By Jai Vijayan Change is the one constant in the threat landscape, and cyber ev READ MORE
http://www.darkreading.com/threat-intelligence/5-ways-the-cyber-threat...

Dark Reading: New ‘Ranscam’ Ransomware Lowers The Bar But Raises The Stakes

Votes:15 Comments:0
Cisco Talos researchers discover new variant that doesn't decrypt your files after you pay up--it has already deleted them. 7/11/2016 By Kelly Jackson Higgins Ransomware variants are multiplyin READ MORE
http://www.darkreading.com/threat-intelligence/new-ranscam-ransomware-...

Dark Reading: Does Defense In Depth Still Work Against Today’s Cyber Threats?

Votes:20 Comments:0
Yes. But not for much longer unless the industry shifts to an automated security and zero trust model. 7/11/2016 By Frank Mong When it was first applied to the cybersecurity industry some 15 ye READ MORE
http://www.darkreading.com/threat-intelligence/does-defense-in-depth-s...

Dark Reading: Shades Of Stuxnet Spotted In Newly Found ICS/SCADA Malware

Votes:35 Comments:0
'IronGate' discovery underlines the risk of industrial attacks yet to come. 6/2/2016 By Kelly Jackson Higgins Newly discovered malware targeting industrial control systems has the researchers w READ MORE
http://www.darkreading.com/threat-intelligence/shades-of-stuxnet-spott...

Dark Reading: Boldest Cybersecurity Predictions For 2016

Votes:19 Comments:0
Forget the boring, safe predictions -- here instead are the most interesting, cringe-worthy, humorous, or otherwise shocking predictions for the coming year. 12/31/2015 By Ericka Chickowski Yes READ MORE
http://www.darkreading.com/threat-intelligence/boldest-cybersecurity-p...

Dark Reading: Researchers Seek Better Ways To Track Malware's Family Tree

Votes:35 Comments:0
Following a program's evolution back to the author may not yet be a reality, but computer scientists are searching for more accurate measures of the relationships between software versions By Rober READ MORE
http://www.darkreading.com/analytics/threat-intelligence/researchers-s...

Dark Reading: Firms Far From Taming The Tower Of APT Babel

Votes:33 Comments:0
Threat intelligence firms continue to have individual lexicons for advanced persistent threats, making information sharing more difficult By Robert Lemos July 25, 2013 Companies looking to lear READ MORE
http://www.darkreading.com/analytics/threat-intelligence/firms-far-fro...

Dark Reading: How Attackers Thwart Malware Investigation

Votes:5 Comments:0
A researcher at Black Hat USA this month will dissect a recent attack, showing off attackers' techniques for making malware analysis harder and intelligence gathering more time consuming By Robert READ MORE
http://www.darkreading.com/analytics/threat-intelligence/how-attackers...

Dark Reading: Security Startups Focusing On Threats, Not Malware

Votes:26 Comments:0
Stopping malware is so yesterday. Eclectic groups of security people have banded together to make life difficult for attackers Jun 14, 2012 By Robert Lemos Security consultant Dino Dai Zovi hac READ MORE
http://www.darkreading.com/analytics/threat-intelligence/security-star...

Dark Reading: Tech Insight: Practical Threat Intelligence

Votes:20 Comments:0
Today's ever-changing threat landscape requires proactive security efforts to identify threats and adapt defenses quickly May 18, 2012 By John H. Sawyer The job of an enterprise security profes READ MORE
http://www.darkreading.com/analytics/threat-intelligence/tech-insight-...
Dark Reading threat intelligence articles
Internet Marketing in Indiana , Internet Marketing in Georgia
-
Search
Search
Search
Search
Login
Privacy Policy