5 Techniques for Collecting Cyber Threat Intelligence

October 16, 2024 at 06:36AM To effectively combat cyber threats, organizations must stay informed about the threat landscape. Analysts can enhance investigations by utilizing techniques like pivoting on Command and Control IPs, analyzing URLs, employing MITRE TTPs, using YARA rules, and examining command line artifacts. ANY.RUN’s TI Lookup tool facilitates these processes. **Meeting Takeaways: Cyber … Read more

Earth Preta Evolves its Attacks with New Malware and Strategies

September 9, 2024 at 03:44AM Earth Preta has enhanced its attacks by incorporating new malware and strategies, such as the propagation of PUBLOAD via a variant of the worm HIUPAN. Additional tools like FDMTP and PTSOCKET are utilized to extend control and data exfiltration capabilities. These attacks are highly targeted and time-sensitive, focusing on specific … Read more

Guide to Better Extended Threat Detection and Response (XDR)

June 4, 2024 at 03:46PM The text is a guide to Extended Threat Detection and Response (XDR) by Trend Micro. It discusses the challenges faced by security teams, the need for efficient threat detection, and the benefits of XDR. It also explains different approaches, such as Native, Open, and Hybrid, and provides considerations for selecting … Read more