Category Archives: Security Threats

STIX, Structured Threat Information eXpression, by Mitre

Structured Threat Information eXpression STIX is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. STIX Use Cases STIX sample This is from the training material. From samples page: STIX Tree Viewer … Continue reading

Posted in ICT, ICT Standards, Security Incidents and Cases, Security Standardization and Practises, Security Threats | Comments Off on STIX, Structured Threat Information eXpression, by Mitre

Indicators of Compromise, OpenIOC and CyBOX

Indicator of compromise IOC IOC in computer forensics is an artifact observed on a network or in operating system that with high confidence indicates a computer intrusion. Typical IOCs are virus signatures and IP addresses, MD5 hashes of malware files … Continue reading

Posted in ICT, ICT Standards, Security Incidents and Cases, Security Standardization and Practises, Security Threats | Comments Off on Indicators of Compromise, OpenIOC and CyBOX

Data Breach reports, by ITRC

Identity Theft Resource Center (ITRC) has been tracking security breaches since 2005, looking for patterns, new trends and any information that may better help us to educate consumers and businesses on the need for understanding the value of protecting personal … Continue reading

Posted in ICT, Security Incidents and Cases, Security Threats, Security Training, Awareness and Reports | Comments Off on Data Breach reports, by ITRC

Cyber Security radar (dashboard) and other online threat level indicators

There are some online resources indicating the current threat level related to cyber security. Radar is explained here. Cyber Security Index by SecureWorks Threat Meter by VeriSign AlertLevel by CERT-EU “number of cases” Infocon as part of Dashboard by SANS … Continue reading

Posted in Cybersecurity, Protection, Risk Management, Security Incidents and Cases, Security Threats | Comments Off on Cyber Security radar (dashboard) and other online threat level indicators

State of the Internet Report by Akamai

Akamai is publishing State of Internet Report (quaterly) which is worth to have a look. The latest is report from Q1 2014.

Posted in Security Management, Security News, Security Threats | Comments Off on State of the Internet Report by Akamai

Report on Cybersecurity Black Market, by RAND and Juniper

RAND has published an interesting report on the cybersecurity black market. This report “Markets for Cybercrime Tools and Stolen Data” was sponsored by Juniper . (direct link to pdf). This report is good reading for any security professional, worth to … Continue reading

Posted in Cloud Security, Cybersecurity, ICT Leadership and Management, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Report on Cybersecurity Black Market, by RAND and Juniper

Digital Attack Map, by Google and Arbor Networks

There is an interesting new site Digital Attack Map related to DDoS attacks. Worth to have a look! From About: Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google … Continue reading

Posted in Security Incidents and Cases, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on Digital Attack Map, by Google and Arbor Networks