Posts Tagged With

Cybersecurity

Cyber Threat Intelligence
Top 5 Cyber Threats to the Healthcare and Public Health Sector in 2022
It’s crucial for organizations in the healthcare and public health sector to gain an awareness of their risk ...
Read post
Cyber Threat Intelligence
Why Every Business Should Have Threat Intelligence
Threat intelligence is an essential component to any organization’s risk-remediation and security program. ...
Read post
Vulnerability Management
China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
Read post
Current events
Shields Up: Understanding Guidance From the Biden Administration About Possible Russian Cyberattacks
On Monday March 21, the Biden Administration released several statements stressing the importance of ...
Read post
Current events
Russian APT and Ransomware Groups: Vulnerabilities and Threat Actors Who Exploit Them
Far before Russia launched its full-scale invasion of Ukraine, cybersecurity officials from the Ukrainian ...
Read post
Vulnerability Management
2021 Sets Record for Most Vulnerabilities Disclosed
Today, the 2021 Year End Vulnerability QuickView Report, from Brian Martin, Vice President of Vulnerability ...
Read post
Corporate & Physical Security
Understanding Security Risks at the 2022 Beijing Winter Olympics: A Practical Guide
In a sign that things are returning increasingly back to a (new) normal around the globe, the Olympics are back ...
Read post
Cyber Threat Intelligence
OCR, Cybersecurity, and Threat Intelligence: Using Optical Character Recognition and Machine Learning to Identify Risk
Optical character recognition (OCR) can immediately help security and fraud teams augment their data collections ...
Read post
Cyber Threat Intelligence
From Ransomware to DDoS: Guide to Cyber Threat Actors—How, Why, and Who They Choose to Attack
Threat actors who execute cyberattacks, such as ransomware, can wreak havoc on organizations across the private ...
Read post
Cyber threat intelligence
The Flashpoint Guide to Card Fraud: How Financial Institutions Can Better Detect, Mitigate, and Prevent Fraud
Card Fraud, or carding, describes the process by which threat actors gain access to, and then leverage, stolen ...
Read post
Cyber threat intelligence
REvil Continues Its Reemergence, Joins Groove-led RAMP Forum
On October 7, cybersecurity analysts at Flashpoint discovered a post on the REvil leaks site, the Happy Blog, ...
Read post
Current events
REvil’s “Cryptobackdoor” Con: Ransomware Group’s Tactics Roil Affiliates, Sparking a Fallout
REvil, a sophisticated Russian-speaking ransomware group, frequently works with affiliates who provide them with ...
Read post