Log4Shell: No Mass Abuse, But No Respite, What Happened?
Credit to Author: Chester Wisniewski| Date: Mon, 24 Jan 2022 17:52:07 +0000
Sophos reviews the scanning and attack detections for Log4Shell to see what’s really going on
Read moreCredit to Author: Chester Wisniewski| Date: Mon, 24 Jan 2022 17:52:07 +0000
Sophos reviews the scanning and attack detections for Log4Shell to see what’s really going on
Read moreCredit to Author: J.J. Thompson| Date: Wed, 15 Jan 2020 13:01:37 +0000
As geopolitical interest increases, discussions of threat intelligence increase which increases pressure on security operations teams to provide answers to customers and to senior leadership.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/pQqkg_WT2eU” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Mat Gangwer| Date: Wed, 15 Jan 2020 10:02:05 +0000
In addition to normal tradecraft adaptations, any time a change in the geopolitical landscape takes place, cyberattack campaigns and adversary behaviors typically shift as well. The recent events with Iran and the United States offer a relevant use case for organizations and have highlighted the benefit of having a threat intelligence driven hunting process. The […]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SIgRbmduM5E” height=”1″ width=”1″ alt=””/>
Read more