Tag Archive for: intelligence

Zero-Day Deals? Shadow Brokers Looking for Windows Exploit Buyer – Security Intelligence (blog)


Security Intelligence (blog)

ZeroDay Deals? Shadow Brokers Looking for Windows Exploit Buyer
Security Intelligence (blog)
Now these cybercriminals are at it again, this time selling what appears to be a zeroday Windows exploit, which, according to Softpedia, may target the Server Message Block (SMB) function on Windows machines and permit the compromise of sensitive …

zero day – read more

Revised Mobile Banking Trojans Faketoken and Tordow 2.0 … – Security Intelligence (blog)


Security Intelligence (blog)

Revised Mobile Banking Trojans Faketoken and Tordow 2.0 …
Security Intelligence (blog)
Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.

and more »

android ransomware – read more

Are rogue intelligence agents using Telkom to spy on SA citizens? – Daily Maverick


Daily Maverick

Are rogue intelligence agents using Telkom to spy on SA citizens?
Daily Maverick
The FinSpy server works in conjunction with software called Fin Fisher. Finfisher is essentially a trojan: software that's installed surreptitiously when a user opens an apparent innocent file, say a Word document or an image attached to an email. Once

finspy – read more

FireEye’s iSIGHT threat intelligence exposes security blind spots

What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field. 

The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum. 

To read this article in full or to leave a comment, please click here

Network World Security