Threat Intelligence

2022 Vulnerability Intelligence Report

Security, IT, and other teams tasked with vulnerability management and risk reduction operate in high-urgency, high-stakes environments where informed decision-making hinges on the ability to quickly find signal in a sea of perpetual noise. When a new potential threat emerges, information security professionals often find themselves needing to translate vague descriptions and untested research artifacts […]

2022 Vulnerability Intelligence Report Read More »

APT Activity Report, T3 2022

Welcome to the T3 2022 issue of the ESET APT Activity Report! This report summarizes the activities of selected advanced persistent threat (APT) groups that were observed, investigated, and analyzed by ESET researchers from September until the end of December (T3) 2022. In the monitored timespan, Russia-aligned APT groups continued to be particularly involved in

APT Activity Report, T3 2022 Read More »

Global Threat Intelligence Report

THREAT INTELLIGENCE CAN BE CONSIDERED “THE ART OF TAKING THE ADVERSARY BY SURPRISE.” ANTICIPATING, MITIGATING, AND PREVENTING SURPRISES IN THE FORM OF CYBERATTACKS IS THE PRIMARY MISSION OF A PRACTICAL THREAT INTELLIGENCE PROGRAM. Achieving that goal requires a proactive approach that answers critical questions like the following: Which threat actors are most likely to cause

Global Threat Intelligence Report Read More »

Threat Intelligence APAC 2023

Remediation-based, orchestrated, automated and customized threat intelligence is the goal. Most organizations have a few steps to go before reaching that goal. Cyber Security executives have realized that raw data is not intelligence. The discipline is not called Threat Raw Data, it’s called Threat Intelligence. Global corporate enterprise cyber security executives must move past a

Threat Intelligence APAC 2023 Read More »

Cyber Threat Intelligence Masterclass 2022

Gaining practical knowledge on how to collect, predict, analyse and actionize cyber threat intelligence into effective cyber security programs is critical. That said, we understand there are several challenges including data mining large amount of threat intelligence information, a lack of knowledge of how threat intelligence is collected and analysed, how to translate threat intelligence

Cyber Threat Intelligence Masterclass 2022 Read More »

Global Threat Intelligence Center Monthly Threat Report, June 2021

Ramifications of the Colonial Pipeline breach Lead Analyst: Bruce Snell, Vice President, Security Strategy and Transformation, US On Friday, 7 May, Colonial Pipeline suspended operations due to a ransomware outbreak, attributed to the DarkSide ransomware group, in their network. With Colonial supplying around 45% of the East Coast’s fuel, this led to panicked runs on

Global Threat Intelligence Center Monthly Threat Report, June 2021 Read More »