
Zeek is Now a Component of Microsoft Windows
Zeek is Now a Component of Microsoft Windows World’s leading open source network security monitoring platform now deployed on more than one billion global endpoints Corelight, the leader in open network detection and response (NDR), today announced the integration...

The Supply of Disinformation Will Soon Be Infinite
The Supply of Disinformation Will Soon Be Infinite Disinformation campaigns used to require a lot of human effort, but artificial intelligence will take them to a whole new level. Someday soon, the reading public will miss the days when a bit of detective work could...

3 Methods to Watch Logs in Real Time in Linux
3 Methods to Watch Logs in Real Time in Linux You know how to view files in Linux. You use cat command or probably less command for this purpose. That's good for files that has static content. But log files are dynamic and their content change with time. To monitor...

The Biggest Corporate Hacks 2021 | Infographic

Sweden Organized Cyber Exercise to Test Cyber Defenses
Military, government and corporate cyber defense experts participated in an exercise focused on protecting the internet infrastructure. Cyber exercises in Sweden simulating attacks on internet infrastructure are key to enhancing defenses as the country prepares to...

Shadowserver’s New Public Dashboard
Thanks to the generous support of the UK Foreign, Commonwealth & Development Office (FCDO), Shadowserver Team sannounce the launch of the new Shadowserver Public Dashboard:https://dashboard.shadowserver.org The new Dashboard lets you explore some of the many...

MISP GUARD
Let’s say that by no means should an attribute of type passport-number leave your MISP instance. Aside from the analyst following best practices when encoding the data, MISP does not have a built-in mechanism to prevent these leaks to happen, but now you can achieve...

Ransomware Group Uses Recycled Code
A new ransomware group, called Monti, appears to have used leaked Conti code, TTPs, and infrastructure approaches to launch its own ransomware campaign. Analysts have discovered a ransomware campaign from a new group called "Monti," which relies almost entirely on...

OpenCTI upgrade: data sharing capabilities
The figure below represents the current landscape of OpenCTI sharing capabilities. OpenCTI data sharing landscape What’s new in OpenCTI 5.3.x? Menu reorganization As data sharing features are increasing, we refactored a bit the menu to group these...