#threat-hunting

[ follow ]
Information security
fromIT Pro
1 day ago

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

Cyber deception tools like honeypots can boost visibility, detect novel threats, and disrupt attackers but require clear strategy, outcome-based metrics, and standardized terminology.
Information security
fromSecuritymagazine
1 month ago

Bringing AI to The SOC Is Not Intended to Replace Humans

AI-powered SOCs must use a consolidated context lake and multi-agent architecture to enable autonomous reasoning, continuous learning, and coordinated SecOps at scale.
fromThe Hacker News
2 months ago

Moving Beyond Awareness: How Threat Hunting Builds Readiness

Make no mistake, as a security professional, I love this month. Launched by CISA and the National Cybersecurity Alliance back in 2004, it's designed to make security a shared responsibility. It helps regular citizens, businesses, and public agencies build safer digital habits. And it works. It draws attention to risk in its many forms, sparks conversations that otherwise might not happen, and helps employees recognize their personal stake in and influence over the organization's security.
Information security
Cryptocurrency
fromThe Hacker News
4 months ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
#cybersecurity
Privacy professionals
fromNextgov.com
7 months ago

CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in

CISA is discontinuing key cybersecurity tools as part of ongoing budget cuts, potentially impacting its threat-hunting capabilities.
[ Load more ]