For much of the time, cybersecurity researchers can find themselves limited to informed speculation and assessment about the sort of activity that cybercriminals perform, prior to launching a large cyber-theft operation. We believe that they will be performing reconnaissance on employees at the bank, particularly those in privileged positions linked to the payment and IT platforms, but some of the more precise details are limited. However, every now and again, information will be leaked which can provide some unique insight into the activities of cybercriminal groups and what they look for in a victim.Continue reading
Some industries are more likely to attract particular kinds of threat actors than others. The retail and hospitality industries for instance are very attractive targets for cyber criminals as both collect and process large quantities of personal and financial data. This is similar to the banking industry but, whereas major bank breaches are now considered to require sophisticated operational procedures and have become the preserve of highly specialised groups, the retail and hospitality industries remain prime targets for criminals of all capabilities.Continue reading
The Russian Federation is currently pursuing a radical transformation to internet connectivity within the country. RuNet 2020 is an ambitious project to establish a national government-controlled network which is intended to function in an insulated environment from the broader internet in the event of a crisis.Continue reading
As of the time of writing, the three bitcoin wallets associated with the WannaCry ransomware have received a combined total of about 53.8 BTC – just shy of USD 500,000 at current conversion rates . This is despite the “kill switch” and other implementation flaws that impeded its early propagation. It also flies in the face of the numerous articles circulating in the security community that cast doubt on whether it is even possible for WannaCry victims to consistently get their files back.Continue reading
The State of Israel has developed exceptional cyber capabilities that surpass all other nations within the MENA region. In January 2017, Prime Minister Benjamin Netanyahu declared that Israel had become one of the top five global cyber powers. Israel conducts covert cyber operations that are strictly classified and rarely formally acknowledged. So, beyond the infamous Stuxnet virus, what do publicly available sources reveal about state-sponsored hackers within Israel?Continue reading
Security Alliance is again attending and presenting at the SANS Cyber Threat Intelligence Summit 2018 in Washington.
The Cyber Threat Intelligence Summit & Training brings together top experts and practitioners for in-depth threat intelligence talks, world-class SANS training, DFIR NetWars, and networking opportunities.Continue reading
The SANS Cyber Threat Intelligence Summit 2017 was held in Arlington Virginia on January 31, 2017 and February 1, 2017.
Watch Rob Dartnall, Cyber Intelligence Director at Security Alliance present : The Use of conventional intelligence methodologies in Cyber Threat IntelligenceContinue reading
Security Alliance has achieved CBEST Threat Intelligence provider status. CBEST is a ground-breaking and targeted cyber assessment scheme, created and run by the Bank of England.
This accreditation recognises Security Alliance’s competency in delivering cyber threat intelligence services to the Finance sector.Continue reading