Posts Tagged ‘threat hunting’

Infocyte HUNT 3.0 Delivers Advanced Threat Hunting to Cyber Risk

The number of long-term hacks being uncovered continues to rise unabated, resulting in millions in financial losses, theft of intellectual property, and/or exposure of customer information. With the threat of undetected compromises and stealthy zero-day attacks breaking through even the best controls, cyber risk managers require more than what is being offered by legacy assessment solutions (which typically only address vulnerabilities or configuration management).

Read More

Protecting PoS systems in the wake of the latest breach at Applebee’s

cybersecurity retail

Last week, Applebee’s announced it was the victim a Point of Sale (PoS) malware attack, warning customers in 15 states that their PII and credit card information was at risk. The attack is reported to have impacted 167 POS systems in the states of Alabama, Arizona, Florida, Illinois, Indiana, Kansas, Kentucky, Missouri, Mississippi, Nebraska, Ohio, Oklahoma, Pennsylvania, Texas, and Wyoming.

Read More

Protecting Critical Infrastructure from Cyberattacks

Modern warfare is increasingly fought not with guns and bombs but with weaponized software. State-backed hackers in North Korea are currently setting their sights on critical infrastructure in the United States with the aim of knocking out power in the country, cybersecurity researchers have warned. Securing critical infrastructure is a priority for national security reasons, but the traditional view of security solely as a defensive measure is not enough to protect these systems; a proactive approach to security in tandem with defensive tools is best way forward to prevent catastrophe and keep people and commerce going.

Read More

Challenges of Threat Hunting with Endpoint Detection (EDR)

Last week in a Live Webinar we looked at the pitfalls of relying solely on Endpoint Detection (EDR) software for proactive threat hunting and examined some of the common misconceptions about the comprehensiveness of the data collected by many EDR solutions. The intention was not to discredit EDR or to say a forensic state analysis (FSA) approach is better, but to reflect on the different approaches to threat hunting which might be more appropriate for your use case. If you couldn’t join us here’s quick overview of what was covered.

Read More

The Cyber Skills Shortage and the Need for Forensic Automation

cybersecurity profile

Last year was a banner year for cybercrime. According to the Online Trust Alliance (OTA), the number of cybersecurity incidents nearly doubled from the previous year, with about 160,000 breaches reported. These events play out against a cyber risk landscape unrecognized outside of the security industry. A landscape bereft of sufficient professionals trained to handle such events.  In short, there is a growing shortage of skilled specialists in the cyber security domain, however, forensic automation provides a solution.

Read More

If You Can Follow 4 Simple Steps, You Can Threat Hunt

By now you have heard of threat hunting and know that is something you should be doing as part of your security best practices. According to the 2017 Threat Hunting Report, understanding its importance and standing up a threat hunting program are not one in the same. If you are part of the 59% of organizations that acknowledge its importance but feel they lack the expert security staff to assist with threat mitigation – read on.

Read More

3 Challenges of Using Log Analysis for Threat Hunting

While there are many techniques that can be used to perform threat hunting, many turn to log analysis. Security analysts have spent countless hours trying to find the proverbial “needle in the haystack” by analyzing logs. Here are 3 of the challenges of using Log Analysis for threat hunting.

Read More