Category Archives: Security Threats
STIX, Structured Threat Information eXpression, by Mitre
Structured Threat Information eXpression STIX is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. STIX Use Cases STIX sample This is from the training material. From samples page: STIX Tree Viewer … Continue reading
Indicators of Compromise, OpenIOC and CyBOX
Indicator of compromise IOC IOC in computer forensics is an artifact observed on a network or in operating system that with high confidence indicates a computer intrusion. Typical IOCs are virus signatures and IP addresses, MD5 hashes of malware files … Continue reading
Data Breach reports, by ITRC
Identity Theft Resource Center (ITRC) has been tracking security breaches since 2005, looking for patterns, new trends and any information that may better help us to educate consumers and businesses on the need for understanding the value of protecting personal … Continue reading
Cyber Security radar (dashboard) and other online threat level indicators
There are some online resources indicating the current threat level related to cyber security. Radar is explained here. Cyber Security Index by SecureWorks Threat Meter by VeriSign AlertLevel by CERT-EU “number of cases” Infocon as part of Dashboard by SANS … Continue reading
State of the Internet Report by Akamai
Akamai is publishing State of Internet Report (quaterly) which is worth to have a look. The latest is report from Q1 2014.
Report on Cybersecurity Black Market, by RAND and Juniper
RAND has published an interesting report on the cybersecurity black market. This report “Markets for Cybercrime Tools and Stolen Data” was sponsored by Juniper . (direct link to pdf). This report is good reading for any security professional, worth to … Continue reading
Digital Attack Map, by Google and Arbor Networks
There is an interesting new site Digital Attack Map related to DDoS attacks. Worth to have a look! From About: Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google … Continue reading