Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence

Far Beyond the Firewall - Experiencing Alert Fatigue From Your Overwhelmed Firewall?

The cyberthreat landscape is ever-evolving and the level of sophistication from cybercriminals is always increasing. Networks are not impenetrable. Alarmingly, 79 minutes is now the average time from when an attacker compromises a network to when they start to move laterally, infiltrating the rest of the network.

Are Firewalls Alone Equipped to Mitigate Against the Increasingly Sophisticated Cyberthreats?

The sheer volume of data breaches continues to escalate at a phenomenal rate. Cyberattacks on all businesses, but particularly small to medium-sized businesses, are becoming more frequent, targeted, and complex. According to Accenture’s Cost of Cybercrime Study, 43% of cyberattacks are aimed at small businesses, but only 14% of those businesses are prepared to defend themselves.

Unlocking Efficiency: Building Automation in ThreatQ Threat Intelligence Platform

Staying ahead of evolving threats is crucial for organizations in all industries. Threat intelligence platforms ( TIPs) play a pivotal role in this endeavor, providing a centralized hub for collecting, analyzing, and disseminating threat intelligence. Introducing the ThreatQ Platform, purpose-built for threat detection and response. To further enhance its capabilities, organizations can leverage automation, streamlining processes and fortifying their cybersecurity posture.

Fortinet Vulnerability: CVE-2024-21762

On Thursday, February 8th, the Fortinet Product Security Incident Response Team released an advisory (FG-IR-24-015) notifying of an out-of-bound write vulnerability in their SSL VPN tracked as CVE-2024-21762. The vulnerability “may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests”.

Security Bulletin: AnyDesk Production Systems Breach

On February 2nd, 2024, AnyDesk disclosed that their production systems had been compromised and that private code signing keys and source code were stolen, while an unknown number of user accounts had their passwords reset. This is a significant concern, as it would allow a malicious attacker to generate malicious versions of AnyDesk software with compromised code that appears to be legitimate. It is assessed that approximately 18,000 credentials are available for sale on the Dark Web as a result.

Threat Intelligence about Oil & Gas Industry

The Oil and Gas industry is part of a country's critical infrastructure and an important part of the energy sector meaning that there is high possibility in being targeted by numerous individual attackers or APTs. Companies in this industry are highly likely to become targets of espionage from other countries and it has been proved that multiple attacks have taken place during the years against this sector, especially during periods of conflicts.

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat intelligence (CTI) market is worth approximately $11.6 billion, and it’s projected to surpass $21 billion by 2027. Why?

5 tips to get the most out of your threat intelligence platform

Threat intelligence management is an essential component of any modern cybersecurity strategy. With cyber attacks becoming more sophisticated and frequent, it’s more important than ever to have the right tools and tactics in place to identify and prevent threats. A threat intelligence platform (TIP) can be a powerful tool in this fight, providing real-time insights and actionable intelligence to help organizations stay ahead of the game.