Tag Archive for: threat

Hyperbole Swirls Around AMD Processor Security Threat

Security community takes a critical look at CTS-Labs’ disclosure of vulnerabilities in AMD vulnerabilities found in EPYC servers, Ryzen workstationsm and Ryzen mobile offerings.
Threatpost | The first stop for security news

North Korea’s ‘Reaper’ hacking group is stepping up its cyber warfare capabilities and is an ‘advanced persistent threat’

  1. North Korea’s ‘Reaper’ hacking group is stepping up its cyber warfare capabilities and is an ‘advanced persistent threat’  Daily Mail
  2. US and North Korea planning ‘cyber war’ as hacker armies faces off  Daily Star
  3. Report Details North Korea’s Cyberwarfare Activities  Newsmax
  4. North Korea’s Growing Criminal Cyberthreat  Scientific American
  5. Full coverage

cyber warfare news – read more

12 Common Threat Intelligence Use Cases

12 Common Threat Intelligence Use Cases

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.

Are you using threat intelligence to its full potential?

The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases.
  • Align these use cases to your specific requirements.
  • Implement strategies for getting value from threat intelligence.
  • Evaluate vendors based on your business needs.

Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Graham Cluley