Security through Intelligence

Adam Vincent

Subscribe to Adam Vincent: eMailAlertsEmail Alerts
Get Adam Vincent: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Adam Vincent

August 18, 2014 By: Kelly Jackson Higgins A look at Operation Arachnophobia, a suspected cyber espionage campaign against India. A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage. Operation Arachnophobia, a campaign that appears to have begun in early 2013, has all the earmarks of classic advanced persistent threat/cyber espionage activity but with a few twists of its own — including the possible involvement of a Pakistani security firm. Researchers from FireEye and ThreatConnect recently teamed up in their investigation of the attacks, which feature a custom malware family dubbed Bitterbug that serves as the backdoor for siphoning stolen information. Though the researchers say they have not identified the specific victim organizations, they have spotted malware bundled with decoy documents related ... (more)

Iranian Cyber Army Hacks Twitter

Twitter on Ulitzer Last night Twitter.com was hacked by a group purportedly titled the Iranian Cyber Army, at least that is what people think based on the fact that this group advertised they were responsible by displaying a redirected web page with an Iranian flag and text that takes credit, saying "This website has been hacked by the Iranian Cyber Army". This morning another website (mawjcamp.org), which appears to be a Iranian Reformist website based outside of Iran was also found to have been hacked. This event comes at a time when the United States Government is saying that ... (more)

Combating Sophisticated Cyber Threats

I was part of a panel titled “Developing Security Strategies to Successfully Combat Sophisticated Threats to your Network, while Protecting Customer Privacy” at the TM Forum conference two weeks ago.  Given the topic, and the interesting conversation, I wanted to highlight some of the ideas expressed around sophisticated threats. Verizon’s Marc Spitler, and AT&T’s Brian Rexroad. Daniel O’Donnel from Network Critical and Ajay Uggirala from NetScout, and Martin Huddleston from United Kingdom (UK) Ministry of Defense (MoD) accompanied me on the panel. In essence, cyber-attack is big... (more)

Context (& Quality) Is King with Threat Intelligence By @AdamDVincent [#Cloud]

Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on the quality of data. So the question becomes, where and how can you gather or make sense of this quality threat intelligence? As an industry, we need to work together to understand threat data better. Everyone needs quality data to make decisions. Just like marketing departments need quality data to determine who to market (and sell) to; the SOC, IR, threat, and network defense team... (more)

What is a Threat Intelligence Platform

Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform.  He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep you all in suspense, I thought this would be an opportune time for ThreatConnect to say what we think a Threat Intelligence Platform is. Rick Holland from Forrester said recently at a SANS conference that the threat intelligence platform is like the quarterback of your operations. The threat intel... (more)