In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.
attribution
Cyber Attribution: What is It good for? | TrendLabs
In-brief: The folks at Trend Labs take apart the recent EyePyramid malware attacks on high profile targets in Italy to talk about the risk of doing cyber attribution badly, and whether its even worth while.
Don’t Be The DNC: An Introduction to Enterprise Threat Hunting
In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune.
Banks Scrutinize SWIFT Following Electronic Heists
In-brief: U.S. banking giant JP Morgan Chase is limiting employees’ access to the SWIFT messaging service, the latest response to a string of attacks on the critical, interbank service.
Obama Proposes Federal CISO, Huge InfoSec Boost
In-brief: President Barack Obama highlighted cyber security as a top policy priority in the final budget proposal of his presidency, seeking a massive expansion in funding for federal information security and the creation of a new federal chief information security officer (CISO).