threat intelligence

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL’s big new study of firmware security. In our second segment, we’re joined by Allan Thomson who is the Chief Technology Officer at LookingGlass Cyber Solutions to talk about the growing use of cyber threat intelligence and the need to evolve cybersecurity practices to keep ahead of fast-evolving threats.

ExileRAT Malware Targets Tibetan Exile Government

Researchers have discovered a new cyber-espionage campaign targeting the organization representing the exiled Tibetan government.

emerging threat graphic flashpoint

Tread Lightly with Threat Intel Add-Ons

Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you’ve ever shopped for a new car, you’re likely familiar with the dizzying number of add-on features available—from custom paint jobs to built-in navigation systems. These features are enticing for an obvious reason: they enable you to customize your car to your preferences, and often at a reasonable price point. Add-ons exist for more than just cars, of course. They’re increasingly available in the threat intelligence market, particularly with respect to datasets. Deep & Dark Web (DDW) data add-ons have grown especially prevalent in recent years, but as with any security-oriented product or service, these offerings aren’t suitable for everyone. Here are some key factors to consider before purchasing a DDW data add-on for your […]

Spotlight: Operationalizing Deep Web and Dark Web Intelligence

In this episode of the podcast: Chris Camacho of Flashpoint joins us to talk about “the deep web” and “the dark web.” Chris and I talk about how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs.

Managed Threat Hunting Bridges the Talent Gap

Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike.