Source: securityboulevard.com – Author: Yuzuka Akasaka The threat landscape has never been more challenging for CISOs and security teams than in 2023. Our research has found...
Author: Yuzuka Akasaka
Dark Web Analytics: Detecting Threats Across the Dark Web – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The nebulous part of the internet: the dark web, which traditional search engines don’t index, serves as a hub for...
Executive Threat Protection: Using Monitoring to Gain the Advantage – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The risk of cyber threats has become an everyday reality for many organizations. This risk is amplified when it comes...
Threat Intelligence Sharing: 5 Best Practices – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka To combat sophisticated and relentless threats effectively, organizations must adopt a collaborative approach that goes beyond their individual security measures....
Actionable Threat Intelligence: Generating Risk Reduction from CTI – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Organizations need to go beyond traditional security measures to effectively protect their valuable assets and maintain a strong security posture....
What is Your Security Attack Surface? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka As businesses and individuals become more reliant on technology, they inadvertently increase their security attack surface – the sum total...
Threat Spotlight: Incident Response & Cybercrime in 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Executive Summary As the threat environment rapidly changes (and threat actors’ tactics along with it), what should cyber practitioners be...
Telegram Hacking Channels: An Emerging Risk – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Telegram, a popular encrypted messaging app known for its commitment to privacy and security, has ironically become a hub for...
Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The notorious Exploit.in dark web forum is a hotspot for cybercriminals and hosts an auction system. On this forum, malicious...
Malware as a Service: An Emerging Threat in 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Capitalizing on the convenience of the Software as a Service (SaaS) model, malicious actors are offering Malware as a Service...
Babuk Ransomware Group: What You Need to Know – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The Babuk ransomware group emerged into the world of illicit activities relatively recently in 2021. Since then, they have conducted...
Grief Ransomware Group: What You Need to Know – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their...
Open Source Threat Intelligence Tools & Feeds: A Complete 2023 List – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The rapidly evolving cyber threat landscape demands constant vigilance from organizations seeking to protect their digital assets. Open source threat...
What are Indicators of Compromise in Threat Intelligence? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Managing security in today’s highly interconnected world can be like trying to put out fires with a collection of squirt...
9 Open Source Threat Intelligence Sources – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Keeping up with cybersecurity news is a challenge. From newly discovered vulnerabilities to new attack methodologies, you live a life...
Log4j, GitHub Repositories, and Attack Surfaces – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Numerous security practitioners and software development teams often utilize public repositories in their daily roles. The goal of these public...
Threat Spotlight: The New Dark Web? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Executive Overview Illicit Telegram channels have become a growing concern in the realm of cybercrime. Threat actors want to connect...