ThreatRavens
  • THREATS
    • DDoS Attacks
    • Malware
    • Phishing
    • Ransomware
    • Trojan/ Worms
  • About Us
  • Contact Us

Email Spoofing – How Attackers Impersonate Legitimate Senders

In a nutshell, Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read More

Why ‘SOAR’ Is Fundamental to a Security Platform

Placing SOAR at the heart of a security platform helps teams extend and maximize value across the ecosystem and to any security process while working in a centralized, coordinated manner.

Read More

Automating Threat Detection and Response With Security Intelligence

Whether an organization is just starting to build its security capabilities or looking to bolster existing controls, there is much that can be achieved. By combining automation with security intelligence, and applying that to existing infrastructure, an organization can greatly improve their security posture.

Read More

Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

By explaining the “why” behind certain rules and policies, security teams can improve workforce risk awareness and, in turn, raise the security posture of the overall business.

Read More

Security News

Malware Analysis

Vulnerability Bulletins

Security Intelligence

Career

Bridging the 3.4 Million Workforce Gap in Cybersecurity

  • ThreatRavens
  • February 3, 2023

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Antivirus

The Evolution of Antivirus Software to Face Modern Threats

  • ThreatRavens
  • February 2, 2023

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.   Because of the increased threat…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Career

How Do Threat Hunters Keep Organizations Safe?

  • ThreatRavens
  • February 2, 2023

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Application Security

Contain Breaches and Gain Visibility With Microsegmentation

  • ThreatRavens
  • February 1, 2023

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Rookie cybersecurity mistakes to avoid | Cyber Work Podcast

  • ThreatRavens
  • February 1, 2023

Venafi solutions architect Steve Judd talks about the rookie mistakes new cybersecurity students make and how to combat issues that arise when deciding your cybersecurity specialization. – Get your FREE…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

What is the Pentagon’s zero-trust policy: An overview | Cyber Work Podcast

  • ThreatRavens
  • January 31, 2023

Venafi solutions architect Steve Judd talks about what the Pentagon’s zero-trust policy is all about: its parameters, directives and what tight deadlines mean for people implementing changes. – Get your…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Cybersecurity leaders need to be communicators | Cyber Work Podcast | #shorts

  • ThreatRavens
  • January 31, 2023

Venafi solutions architect Steve Judd says everyone has to do security. No matter the level of your technical skill, cybersecurity leaders need to be good communicators first and foremost. –…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
cfo

CEO, CIO or CFO: Who Should Your CISO Report To?

  • ThreatRavens
  • January 31, 2023

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Prilex modification now targeting contactless credit card transactions

  • ThreatRavens
  • January 31, 2023

Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected device.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
bitcoin

How the Silk Road Affair Changed Law Enforcement

  • ThreatRavens
  • January 30, 2023

The Silk Road was the first modern dark web marketplace, an online place for anonymously buying and selling illegal products and services using Bitcoin.  Ross Ulbricht created The Silk Road…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail

Posts navigation

1 2 … 2,229 Next

Subscribe to Our Newsletter

About Us

As cyber attacks grow more complicated and targeted, organizations should take every possible opportunity to learn more about the potential attacks being targeted against them. ThreatRavens helps you keep your security and incident response teams updated about latest happenings in Cyber Security space.

Advertisement

About Us

ThreatRavens Logo - Dark

ThreatRavens brings you latest cyber security news, updates, vulnerability disclosure bulletins, malware analysis reports and latest happenings in security space.

Our Recent Tweets

  • Google Chrome Artifacts (User) https://t.co/Pt8D3cNjY3236 days ago
  • Google Chrome Artifacts (User) https://t.co/9SyABARLNk Google Chrome Artifacts (User) Preferences – C:UsersUserDire… https://t.co/lVk41lJ7ul236 days ago
  • Email #Spoofing - How Attackers Impersonate Legitimate Senders https://t.co/jopSzRqjHT In a nutshell, Email… https://t.co/hIHJ2zLMihover a year ago

Browse Tags

APT28 Browser Forensics Chrome CISA Cyber Career Forum Cyber Security Cyber Threat Intelligence Data Breach Data Theft DFIR Drovorub Linux Rootkit email spoofing Fancy Bear Google Chrome Indicators of Compromise Information Security InfoSec Malware Analysis NSA Advisory Phishing Ransomware Russian APT Security Intelligence Security Learning spoofing Threat Research US-CERT
  • Facebook
  • Twitter
  • RSS
2020 ThreatRavens. All Rights Reserved.