Get trending threat insights delivered to your inbox with Recorded Future’s free Cyber Daily newsletter

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web. The FREE Cyber Daily email, highlights trending threats selected from […]

HP-Bromium Threat Insights Report, May 2020

The May 2020 HP-Bromium Threat Insights Report highlights notable threats isolated by HP Sure Click in March and April 2020. The report discusses recent malware campaigns, techniques and mitigations so that security teams can better understand the threat landscape and defend their environments. Highlights from May’s report include a breakdown of the top COVID-19-related email lures […]

HELK – Open Source Threat Hunting Platform

The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing, structured streaming, and even machine learning via Jupyter notebooks and Apache Spark over an ELK stack. This project was developed primarily for research, but due to its flexible design and core components, […]

Recorded Future’s free Cyber Daily newsletter brings trending threat insights straight to your inbox

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the web. The FREE Cyber Daily email, highlights trending threats selected from […]

HP-Bromium Threat Insights Report, July 2020

Welcome to the July 2020 edition of the HP-Bromium Threat Insights Report! Highlights from July’s report include a discussion of how an Aggah malicious spam campaign targeted businesses in Europe, North America and Asia, how attackers use compromised infrastructure to bypass reputation-based security controls, and recent QakBot and WannaMine campaigns. The report describes recent malware […]

Next Page »