Category: Cyber Threat Intelligence

Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis

May 1, 2014 • Chris

This investigation uses open source intelligence to shed new light on Hidden Lynx.

Tracking the Clandestine Fox

April 29, 2014 • Matt Kodama

Using open source intelligence, we are watching the emerging discussion about Operation Clandestine Fox.

Heartbleed: Quick Turnaround in Open Source Reporting

April 24, 2014 • Caroline Flannery

Biometric Authentication: Still Waiting for Identity 2.0

April 20, 2014 • Matt Kodama

Will innovation in biometric authentication and identity management lead us to a post-password world in the near future?

Windows XPocalypse and the Spread of ATM Malware

April 2, 2014 • Caroline Flannery

Threat intelligence teams can safely assume ATM malware incidents will rise after Microsoft stops supporting Windows XP on April 8.

Why Security Teams Should Pay Attention to the European Cyber Army

March 12, 2014 • Jennifer

The European Cyber Army (ECA) kicked off 2014 by posting successful cyber attacks on governments, companies, and organizations around the world.

The Russia-Ukraine Cyber Front Takes Shape

March 7, 2014 • S3

In the wake of Kiev protester deaths and claimed cyber attacks on Ukrainian system, the battlefronts in the Russia/Ukraine crisis have taken shape.

South Korea’s Cyber Defense Policy Hasn't Been Effective

February 25, 2014 • Gus Swanda

As the most wired nation in the world, South Korea serves as an acid test for cyber defense policy.

Analyzing the Patch Timeline for Zero-Day Exploits

February 18, 2014 • Lee Kagan

3 Malware Trends You Need to Know About

November 14, 2013 • Lee Kagan

This analysis looks at malware trends; including inception, infection, variations, and destruction as they progress through the net and into our lives.