Tag: Threat Hunting
-
Qakbot Strikes Back: Understanding the Threat
Binary Defense threat researchers analyzed the reemergence of the QakBot botnet. The new QakBot DLL has undergone some minor changes, and …
-
MalSync Teardown: From DLL Hijacking to PHP Malware for Windows
Your Enterprise Defense Partner Our portfolio of security services offers comprehensive coverage to protect and defend your business from …
-
Threat Intelligence & Threat Hunting – Chris Cochran – ESW Vault
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September …
-
Ermac malware: The other side of the code
When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. …
-
Web injections are back on the rise: 40+ banks affected by new malware campaign
Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These …
-
Beyond Alerting: Finding Hidden Threats
Hypothesis-driven threat hunting is a tailored, proactive, and deeply analytical approach to cybersecurity. It leverages the acumen of …
-
Webinar: Maximizing your investment in Converged SIEM with Threat Hunting
Date: 7th …
-
Threat hunting 101: How to outthink attackers
Threat hunting involves looking for threats and adversaries in an organization’s digital infrastructure that existing security tools …
-
Threat Hunting: Collaboration. Harnessing the Power of Teamwork
In today’s ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively combat …
-
Vulnerability management, its impact and threat modeling methodologies
Vulnerability management is a security practice designed to avoid events that could potentially harm an organization. It is a regular …
-
Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub
Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. …
-
The Trickbot/Conti Crypters: Where Are They Now?
Despite Conti shutdown, operators remain active and collaborative in new factions In IBM Security X-Force, we have been following the …
●●●