In today’s wildly unpredictable threat landscape, the modern enterprise should be familiar with the cyber kill chain concept. A cyber kill chain describes the various stages of a cyberattack pertaining…
Browsing CategoryAdvanced Persistent Threat (APT)
Beware of What Is Lurking in the Shadows of Your IT
This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections.…
IOCs vs. IOAs — How to Effectively Leverage Indicators
Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners…
What Is SIEM and How Does it Work?
A hidden, lingering threat is a cybersecurity team’s worst nightmare. With security information and event management (SIEM), your team has fewer blind spots when it comes to detecting threats. If…
Combating Sleeper Threats With MTTD
During the SolarWinds Orion supply chain compromise, threat actors lurked in the victim’s network for more than a year. Discovered by FireEye in December 2020, the earliest traces of a…
Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0
Humanity has been through a number of industrial revolutions since the 1760s, and is now at its fourth cycle of sweeping industrial innovation, known as Industry 4.0. It is characterized…
Safeguarding Healthcare for the Future With Zero Trust Security
In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three…
New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users
IBM X-Force researchers have discovered a new campaign targeting organizations with fake business emails that deliver NetWire remote-access Trojan (RAT) variants. The RAT is hidden inside an IMG file, which…
What Are Advanced Persistent Threats (APTs), and How Do You Find Them?
As organizations grapple with the explosion of new and novel threats, they are often constrained by both time and resources to address them. With the cybersecurity skills gap expected to…
Get Ahead of Cybersecurity AI Maturation by Building a Cognitive SOC
There’s no doubt that artificial intelligence (AI) for cybersecurity is surrounded by an incredible amount of hype. Cognitive intelligence and machine learning have the potential to combat a series of…