Geek-Guy.com

Tag: Threat Detection

MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

The MITRE ATT&CK threat framework is seemingly everywhere these days, and with good reason. It is an invaluable tool for understanding the various methods, or as MITRE refers to them Tactics and Techniques, employed by threat actors. It offers annotated and curated details about those methods, and it provides the capability to visualize this data […]

The post MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be? appeared first on Security Intelligence.

DomainTools Announces Availability of Iris Detect

DomainTools has announced the availability of DomainTools Iris Detect, an innovative new product designed to discover and monitor domain names spoofing brands, trademarks, or other domains with unprecedented speed, accuracy, and comprehensiveness. Building on the world’s largest databases of domain registration and Domain Name System (DNS) data developed by DomainTools and Farsight Security, the discovery engine underpinning Iris Detect […]

The post DomainTools Announces Availability of Iris Detect appeared first on IT Security Guru.

Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Taking Threat Detection and Response to the Next Level with Open XDR

The challenges facing today’s security industry can easily be described as a perfect storm: increasingly sophisticated cyber attackers combined with the proliferation of security tools to cover an expanding attack surface driven by remote work and cloud adoption. These dynamics can lead to disconnected insights and data, putting even more pressure on the existing shortage […]

The post Taking Threat Detection and Response to the Next Level with Open XDR appeared first on Security Intelligence.

Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for supply chain cyberattacks. Office-Related Cyberattacks […]

The post Cyberattacks Use Office 365 to Target Supply Chain appeared first on Security Intelligence.