CyberSecurity

How Threat Actor Profiling Enhances Security Resilience – Part 1

by Ben Kapon

posted at October 15, 2019

When it comes to threat actors capable of carrying out significant cyber-attacks and posing a real threat to your security resilience, there are more differences than similarities. Threat actor profiling is inefficient as long as it remains sporadic and dependent on different vendors’ research and publication of threat intelligence.

Demonstrating the Importance of Intelligence for National Security at ISDEF 2019

by Colleen Gustitus

posted at May 28, 2019

Though the meaning of “security” has evolved significantly over the last several years, one fact remains certain: protecting people, property, and assets has never been more important than in today’s rapidly expanding risk landscape. In addition, while this applies to mission-critical organizations of all shapes and sizes, there is one market that must contend with

Breaking Down Builder-encrypted RAT

by Nadav Lorber

posted at November 7, 2018

The emerging trend of Fully Undetectable (FUD) malware builders is not new to our research team. However, in light of the wide variety of techniques that the malware authors keep developing, it’s obvious that we will always encounter malicious code execution tricks that successfully bypass traditional anti-malware solutions. This blog post is actually a case

Threat Hunting with TPS to Reveal Undetected Malicious Activities

by Nadav Lorber

posted at October 25, 2018

One of the common concepts applied in threat hunting, is to define a hypothesis that will yield indicators/TTPs to follow, in order to discover malicious behavior that went under the radar. When using Verint’s Threat Protection System (TPS) for example, we can utilize predefined queries that aim to discover malicious indicators within the events’ raw