Tagged: Threat Intelligence
To win the cat-and-mouse game between the defenders and cyber adversaries, organizations require a new way of orchestrating their security operations by inculcating threat intelligence into the mix. click here to read full Article...
Volexity attributes the compromise of the Daily NK website to a threat actor it refers to as InkySquid, which broadly corresponds to an activity known publicly under the monikers ScarCruft and APT37. click here...
To take down bigger targets more easily, ransomware gangs are increasingly tapping initial access brokers, who sell ready access to high-value networks for a few hundreds or thousands of dollars. Click here for image...