In the spotlight this week: Since the recent airstrikes by the United States in Iran, which resulted in the death of General Qasem Soleimani, security researchers and media outlets have been focused on the potential of any Iran-associated response. The geopolitical tension that already existed between the United States and Iran has sometimes resulted in offensive cyber activity―mostly destructive, disruptive, and/or espionage campaigns. A cyber response from Iran is an option but in this case there is no guarantee, considering the nature and impact of the physical event. If any does occur, the Iranian threat actors’ capabilities, tool sophistication, and tactics, techniques, and procedures (TTPs), as well as impact of a successful cyber attack, would likely be similar to those previously exhibited, although the motive and attack focus may differ.
Error - something went wrong!
Blog | PowerShell Security Best Practices
Threat actors have long since used legitimate tools to infiltrate and laterally move across defender’s netw...
Other content in this Stream
Digital Footprint Monitoring
Gain an attackers-eye-view of your external-facing infrastructure.
BlueKeep: Cutting through the hype to prepare your organization
Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the
Blog | PowerShell Security Best Practices
Threat actors have long since used legitimate tools to infiltrate and laterally move across defender’s networks. The reasons for this ...
Iranian Cyber Threats, Travelex Ransomware Attack, And Exploit Forum Updates
Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely.
Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories
Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6...
Threat Intelligence: A Deep Dive
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
Honeypots: Tracking Attacks Against Misconfigured or Exposed Services
Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
Breach! Exploring the Modern Digital Breach: Part 1
It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick
Weekly Intelligence Summary 17 Oct - 24 Oct 2019
In the spotlight this week: Russia-linked threat group “Turla” was reported to be using cyber-attack tools associated with Iran-linked threat group “APT34”, in conjunction with Turla’s own tools.
Avast Breach Attempt, NordVPN Breach, And Wifi Security Risks
The team first looks at Avast, which encountered a cyber espionage attempt. Then NordVPN announced that a hacker had breached servers used by NordVPN. And finally Dr. Richard Gold put out a new blog t
Lessons Learned from Equifax Breach
What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.
GAO’s Equifax Post-mortem Report
It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. ...
Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign
Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of...
Blog | 2017 Equifax Breach: Impact and Lessons Learned