Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware ...
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as ...
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but ...
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s ...
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the ...
In The News
Sort By
- Date
- Title
Forescout published its “2024H1 Threat Review”. The new report reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 ...
Additional findings show unwanted bots, short-lived IP addresses and out-of-band domains used by adversaries to commit cybercrime and avoid detection
North Korean insider threat targets U.S. technology companies; cloud and cross-domain attacks, credential and RMM tool abuse persists
New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats
Palo Alto Networks, the global cybersecurity leader, today ...
Sydney, 13 August: Researchers at Infoblox and Eclypsium have discovered that a powerful attack vector in the domain name system (DNS) is being widely exploited across many ...
The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity – is by far the largest structure humanity ever built. It’s so big, in fact, ...
Podcasts On Threat Intelligence