ThreatRavens
  • THREATS
    • DDoS Attacks
    • Malware
    • Phishing
    • Ransomware
    • Trojan/ Worms
  • About Us
  • Contact Us
Jun 09, 2021

Email Spoofing – How Attackers Impersonate Legitimate Senders

In a nutshell, Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read More
May 19, 2020

Why ‘SOAR’ Is Fundamental to a Security Platform

Placing SOAR at the heart of a security platform helps teams extend and maximize value across the ecosystem and to any security process while working in a centralized, coordinated manner.

Read More
May 14, 2020

Automating Threat Detection and Response With Security Intelligence

Whether an organization is just starting to build its security capabilities or looking to bolster existing controls, there is much that can be achieved. By combining automation with security intelligence, and applying that to existing infrastructure, an organization can greatly improve their security posture.

Read More
May 08, 2020

Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

By explaining the “why” behind certain rules and policies, security teams can improve workforce risk awareness and, in turn, raise the security posture of the overall business.

Read More

Security News

Malware Analysis

Vulnerability Bulletins

Security Intelligence

cloud native

Is 2022 the Year of Secure Access Service Edge?

  • ThreatRavens
  • June 30, 2022

In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps,…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact

  • ThreatRavens
  • June 30, 2022

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Fact or fiction: “You need passion to get hired in cybersecurity” | Cyber Work Podcast

  • ThreatRavens
  • June 29, 2022

Passion. Passion. Passion. If you’ve listed to any of the 240+ episodes of Cyber Work, you likely heard our guests say it’s one of their top criteria for hiring. "Just…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
ai security

4 Ways AI Capabilities Transform Security

  • ThreatRavens
  • June 29, 2022

Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Artificial Intelligence (AI)

Five Key Trends on SOC Modernization

  • ThreatRavens
  • June 29, 2022

For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Fact or fiction: “Employees are your weakest cybersecurity link” | Cyber Work Podcast

  • ThreatRavens
  • June 28, 2022

Employees are your weakest link. No matter how much you invest in cybersecurity, humans will always be exploitable. All it takes is one employee to make one mistake one time,…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Fact or fiction: “It’s not if you get breached, but when” | Cyber Work Podcast

  • ThreatRavens
  • June 28, 2022

"There are only two types of companies: those that have been hacked, and those that will be." That famous quote attributed to then FBI director Robert Muller has been parroted…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Advanced Attacks

Digital Shadows Weaken Your Attack Surface

  • ThreatRavens
  • June 28, 2022

Every tweet, text, bank transaction, Google search and DoorDash order is part of your digital shadow. We all have one, and the contents of your shadow aren’t always private. For…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Career

5 Ways to Retain More Cybersecurity Professionals at Your Organization

  • ThreatRavens
  • June 27, 2022

Companies that have low retention rates are likely to increase their risk of a cybersecurity attack. The recent ISACA’s State of the Cybersecurity Workforce study found that 69% of respondents…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Cybersecurity has a marketing problem — and we’re going to fix it | Cyber Work Podcast

  • ThreatRavens
  • June 24, 2022

On today’s episode, we’re breaking down phrases you’ve heard a million times: “security is everyone’s job,” “humans are the weakest link in the security chain,” “it’s not if you get…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail

Posts navigation

1 2 … 2,195 Next

Subscribe to Our Newsletter

About Us

As cyber attacks grow more complicated and targeted, organizations should take every possible opportunity to learn more about the potential attacks being targeted against them. ThreatRavens helps you keep your security and incident response teams updated about latest happenings in Cyber Security space.

Stay Connected

Latest Posts

  • Is 2022 the Year of Secure Access Service Edge?
    June 30, 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
    June 30, 2022
  • Fact or fiction: “You need passion to get hired in cybersecurity” | Cyber Work Podcast
    June 29, 2022

Advertisement

About Us

ThreatRavens Logo - Dark

ThreatRavens brings you latest cyber security news, updates, vulnerability disclosure bulletins, malware analysis reports and latest happenings in security space.

Our Recent Tweets

  • Google Chrome Artifacts (User) https://t.co/Pt8D3cNjY318 days ago
  • Google Chrome Artifacts (User) https://t.co/9SyABARLNk Google Chrome Artifacts (User) Preferences – C:UsersUserDire… https://t.co/lVk41lJ7ul18 days ago
  • Email #Spoofing - How Attackers Impersonate Legitimate Senders https://t.co/jopSzRqjHT In a nutshell, Email… https://t.co/hIHJ2zLMihover a year ago

Browse Tags

APT28 Browser Forensics Chrome CISA Cyber Career Forum Cyber Security Cyber Threat Intelligence Data Breach Data Theft DFIR Drovorub Linux Rootkit email spoofing Fancy Bear Google Chrome Indicators of Compromise Information Security InfoSec Malware Analysis NSA Advisory Phishing Ransomware Russian APT Security Intelligence Security Learning spoofing Threat Research US-CERT

Subscribe to Newsletter

  • Facebook
  • Twitter
  • RSS
2020 ThreatRavens. All Rights Reserved.
Posting....