Threat Hunting. MITRE ATT&CK. These words have been thrown around, mashed
together, and forced upon the cyber security world en masse lately. There is
no shortage of blogs on each, or on the combination of both – trying to
explain them, define them, or show how they matter to every organization …
Not who, not how…but where
Across the globe, organizations are being attacked by well-funded hacking
groups who succeed in breaching traditional perimeter defenses. These attacks
serve to remind us that we can no longer rely entirely on preventive security
measures. The reality is that if a gr …
Spoiler alert! In this blog, I’ll be outlining our approach to solving a
cyber challenge that has been posted by the Israeli Secret Service (Shabak).
This is not a traditional hacking challenge, but rather focuses on software
engineering and data science.
The Israel Secret Service, Shabak, try …
In last week’s blog I explained what Insider Threats were, and why
organizations should be taking the risk that they pose seriously. This week
I’ll be explaining how the organization should approach the issue of
insider threat and how you can take the first steps to assessing your level
of I …
Last year we saw a spate of high-profile cyber security breaches that all had
one thing in common – they originated from a malicious insider. As
cybersecurity professionals, its easy to become so focused on the external
threats that we can often forget the threats that could be sitting right
With the end of each year, security professionals break out their crystal
balls to estimate what will be the industry’s trends for the coming year.
To break this tradition, I decided to not ask my crystal ball, but my magic 8
ball. This post will cover some of the trends that we can look forwar …
The Fidelis Threat Research analysts have discovered a new version of
ThreadKit, malware notorious for its use by the cybercrime organization known
as Cobalt Group. This blog post is going to provide some insight into the
group. If you want to dive straight into the detail of Fidelis research,
The retail, travel and hospitality industries face difficult security
challenges year-round, but November through to the end of the year is the
time that keeps the security professionals in these industries especially
busy. The holiday shopping season is a time for financially motivated actors
Recently we announced our 2018 State of Threat Detection survey results and
we picked up on some interesting trends around the subject of threat hunting.
But what exactly is threat hunting? Who's doing it? And how can you do it
too? Find out the answers below:
What is threat hunting?
Threat hun …