Discover how insider threat incidents like the Avis cyberattack challenge organizations and how strategies like microsegmentation can help.
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s ...
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the ...
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly ...
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled ...
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...
In The News
Sort By
- Date
- Title
Rapid7 has been positioned as a Leader in the IDC MarketScape: Worldwide SIEM for SMB 2024. SIEM technology often sits at the heart of the security operations centre (SOC) as ...
This month, Microsoft patched two zero-day vulnerabilities that can bypass security features in Microsoft Office and Windows Mark of the Web. Both vulnerabilities were ...
September 11, 2024 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the financial ...
Forescout published its “2024H1 Threat Review”. The new report reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 ...
Additional findings show unwanted bots, short-lived IP addresses and out-of-band domains used by adversaries to commit cybercrime and avoid detection
North Korean insider threat targets U.S. technology companies; cloud and cross-domain attacks, credential and RMM tool abuse persists
Podcasts On Threat Intelligence