HackDig : Dig high-quality web security articles for hacker

Follow The Money: Dissecting the Operations of the Cyber Crime Group FIN6

Cybercrime operations can be intricate and elaborate, with careful planning needed to navigate the various obstacles separating an attacker from a payout. Yet reports on these operations are often fragmentary, as the full scope of attacker activity typically occurs beyond the view of any one group of investigators. FireEye Threat Intelligence and iSIGHT Part
Publish At:2016-04-21 10:30 | Read:3183 | Comments:0 | Tags:iSIGHT Partners cyber crime cyber threat intelligence FIN6 h

PART 1: Cyber Threat Intelligence and the SOC Level 1 Analyst

At iSIGHT Partners, we are often asked exactly how cyber threat intelligence benefits different groups within an IT organization. To answer those questions, we are publishing a series of posts on CTI use cases for the SOC Level 1 Analyst, the Incident Responder, the CISO, the Threat Intelligence Analyst, the NOC Analyst, and the team responsible for vulnerab
Publish At:2015-12-16 04:10 | Read:2282 | Comments:0 | Tags:iSIGHT Partners cyber threat intelligence Roles-Based Use Ca

PART 2: Cyber Threat Intelligence and the SOC Level 1 Analyst

Read the first post on this topic here.  How the SOC Uses Cyber Threat Intelligence In our previous post we introduced three use cases of how cyber threat intelligence helps SOC Level 1 analysts. Those use cases are summarized in this table: Figure 1: Cyber Threat Intelligence Use Cases for SOC Level 1 analysts In this post we discuss exactly how cyber thr
Publish At:2015-12-16 04:10 | Read:2590 | Comments:0 | Tags:iSIGHT Partners cyber threat intelligence Roles-Based Use Ca

Shifu Malware Analyzed: Behavior, Capabilities and Communications

A Look at Shifu – Behavior, Capabilities and Communications… As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide analysis to our clients on new and emerging threats. As you can imagine, we naturally run into large quantities of malware on a daily basis. From time t
Publish At:2015-10-31 06:55 | Read:11996 | Comments:0 | Tags:iSIGHT Partners crimeware cyber crime Cyber Crime Malware Cy

Have You Pivoted Yet? Rapidly Move Between Data and Intelligence for Correlation and Alert Prioritization

This is Cool Stuff… When we launched the second revision of our ThreatScape API early this year, we were extremely excited about the pivot functionality we added as we heard from a number of customers doing security operations and incident response that they needed functionality to rapidly move between data and intelligence for correlation and alert pr
Publish At:2015-10-14 18:40 | Read:2829 | Comments:0 | Tags:iSIGHT Partners APIs for cyber threat intelligence CTI and A

Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 1)

So what is this all about?? As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and  the world of cyber espionage. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks.  As you can imagine, we naturally run into larg
Publish At:2015-09-25 01:30 | Read:7189 | Comments:0 | Tags:iSIGHT Partners angler exploit kit crimeware cyber crime cyb

TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications

Monitoring TeslaCrypt… As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide analysis to our clients on new and emerging threats. As you can imagine, we naturally run into large quantities of malware on a daily basis. From time to time, we release findings to the public in
Publish At:2015-09-16 23:55 | Read:5510 | Comments:0 | Tags:iSIGHT Partners analysis of ransomware analysis of teslacryp

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud