Threat Intelligence

ThreatConnect Acquires Nehemiah Security to Add Risk Quantifier Capabilities

ThreatConnect has announced the acquisition of Nehemiah Security, adding cyber-risk quantification to its existing threat intelligence platform (TIP) and security

Source Code of Dharma Ransomware Now Surfacing on Public Hacking Forums

The source code of the infamous Dharma ransomware is now available for sale on two Russian-language hacking forums. The source

Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals

Threat Intelligence & Endpoint Security Tools are more often used by security industries to test the vulnerabilities in network and

How Does Cyber Threat Intelligence Benefits at Security Operation Centre Defense Phase

Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality

New Free Cyber Threat Intelligence Tool to Discover Malicious IPs and Domains

A new free cyber threat Intelligence tool that helps you in identifying malicious IP addresses and domains. It provides you

SilkETW – New Free Threat Intelligence Tool to Capture and Analyze Windows Events Logs

SilkETW is a flexible tool aimed to reduce the complexities of ETW(Event Tracing for Windows) and to put actionable data

Fortinet Gets ZoneFox, Bitdefender Grabs RedSocks

Fortinet and Bitdefender are hoping that their latest acquisitions will augment their threat intelligence offerings, with each organization today announcing

Threat Intelligence Feeds: Overview, Best Practices, and Examples

Threat intelligence feeds are third-party streams of indicators or artifacts, with the singular goal of learning from other organizations’ access

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make

Startup Spotlight: NewSky Security looks to disrupt hackers before nefarious plots are hatched

Hardly a day goes by without a high-profile security breach or nasty computer hack. Scott Wu and Song Li —

Threat intelligence: A key weapon in your security armoury

A seemingly endless stream of high-profile data breaches have given cyber security a new impetus, bringing it very much to