Forecasting: All for One and One for All in Cybersecurity
Mon, 21 Dec 2020 17:00:00 +0000
Mon, 21 Dec 2020 17:00:00 +0000
Mon, 14 Dec 2020 17:00:00 +0000
Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.
Mon, 07 Dec 2020 17:00:00 +0000
Last weekend we issued a ransomware alert about a wave of attacks using a never-seen-before strain dubbed ‘Pay2Key.’ Our investigation suggested the ransomware operators were mostly targeting Israeli companies. The ransomware used in the attacks spread rapidly across victims’ networks, leaving significant parts of the network encrypted along with a ransom note, threatening to leak stolen corporate data unless the ransom is paid.
Mon, 18 May 2020 15:00:00 +0000
Coordinated Vulnerability Disclosure is hard: Here is what to do about it.
FIRST runs a blog open to members and invited guest authors. It publishes contributions relevant to incident responders. Articles should focus on general topics interesting to members. It will not be used to promote individual organisations, products or services. If you are interested in contributing, please get in touch with first-blog@first.org.
Learn more about the Forum of Incident Response and Security Teams through regular blog posts about our organization, events and other programs. Questions or comments? Contact first-press@first.org.
RDF Site Summary (RSS) is a lightweight multipurpose extensible metadata description and syndication format.
Subscribe to the FIRST Blog using our RSS feed:
RSS 2.0