The outbreak of the Coronavirus demonstrates how agile and quick cyber attackers are to exploit a vulnerability or human weakness. Read here about recently identified malicious campaigns related to the COVID-19 pandemic.
Verint’s Cyber Threat Intelligence (CTI) Group analysis of the top 20 vulnerabilities that are currently exploited by attack groups worldwide. Provides security professionals with an incentive to improve their patching management activities.
When it comes to threat actors capable of carrying out significant cyber-attacks and posing a real threat to your security resilience, there are more differences than similarities. Threat actor profiling is inefficient as long as it remains sporadic and dependent on different vendors’ research and publication of threat intelligence.