Spam and phishing in 2023 This report contains spam and phishing statistics for 2023, along with descriptions of the main trends, among these artificial intelligence, instant messaging phishing, and multilingual BEC attacks. Kaspersky Security Bulletin ...
Any information security threat can be grouped into one of a few high-level threat categories: • Natural disaster • Infrastructure failure • Internal abuse • Accident • External targeted attack • External mass attack It is generally in the nature of a security professional to assume...
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. By registering, you agree to theTerms of Useand acknowledge the data practices outlined in thePrivacy Policy. You may unsubscribe from these newsletters at any tim...
Threat intelligence exists in three main categories: Tactical — technical information, such asindicators of compromise. Operational — a description of techniques and procedures used by attackers, as well as their capabilities and objectives. Strategic — data about risks associated with specific threats...
Cyberthreat talks 16 Jul 2024, 5:00pm 60 min Cybersecurity’s human factor – more than an unpatched vulnerability Oleg Gorobets Register to Access All Kaspersky Webinars All Webinars Categories APT reports Archive Crimeware reports DDoS reports Events Incidents Industrial threats View all cat...
Kaspersky Security Bulletin Advanced threat predictions for 2025 Kaspersky’s Global Research and Analysis Team monitors over 900 APT (Advanced Persistent Threat) groups and operations. In this piece of KSB series, we review the advanced threat trends from the past year and offer insights into what...
Feel free tocontribute. Sources Most of the resources listed below provide lists and/or APIs to obtain (hopefully) up-to-date information with regards to threats. Some consider these sources as threat intelligence, opinions differ however. A certain amount of (domain- or business-specific) analys...
Categories CefExternalSecuritySolution CefSolutionProperties CloudError CloudErrorBody CloudName CloudOffering CloudOfferingUnion Compliance ComplianceList ComplianceResult ComplianceResultList ComplianceResults ComplianceResultsGetOptionalParams ComplianceResultsGetResponse ComplianceResultsListNextOptionalParams ComplianceResults...
It focuses on six threat categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. STRIDE was introduced by Microsoft and has gained popularity due to its effectiveness and simplicity. MITRE’s ATT&CK™ The MITRE’s ATT&CK™ framework...
Such information can inform on where to dedicate resources, such as topics requiring security training or areas to build threat hunting playbooks. Overview of analysis We’ll look at DNS queries to domains that fall into certain categories of malicious activity, and in some cases specific threats...