ThreatScape Media Highlights Update – Week Of October 28th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleShifu Malware Analyzed: Behavior, Capabilities and Communications
A Look at Shifu – Behavior, Capabilities and Communications… As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide...
View ArticleThreatScape Media Highlights Update – Week Of November 5th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleThreatScape Media Highlights Update – Week Of November 10th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleThreatScape Media Highlights Update – Week Of November 17th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with...
Today, iSIGHT Partners is sharing details about a highly sophisticated criminal malware framework that has been used to target point-of-sale (POS) systems at US-based retailers. We believe this very...
View ArticleThreatScape Media Highlights Update – Week Of December 2nd
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleThreatScape Media Highlights Update – Week Of December 9th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleHow CTI Helps Six Groups Do Their Jobs Better: A New Blog Series!
The importance of Cyber Threat Intelligence (CTI) has become more widely recognized in the past year. But not many people realize how many different ways threat intelligence can be utilized across an...
View ArticlePART 1: Cyber Threat Intelligence and the SOC Level 1 Analyst
At iSIGHT Partners, we are often asked exactly how cyber threat intelligence benefits different groups within an IT organization. To answer those questions, we are publishing a series of posts on CTI...
View ArticlePART 2: Cyber Threat Intelligence and the SOC Level 1 Analyst
Read the first post on this topic here. How the SOC Uses Cyber Threat Intelligence In our previous post we introduced three use cases of how cyber threat intelligence helps SOC Level 1 analysts. Those...
View ArticleThreatScape Media Highlights Update – Week Of December 16th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticlePart 3: Cyber Threat Intelligence and the Incident Responder
At iSIGHT Partners, we are often asked exactly how cyber threat intelligence benefits different groups within an IT organization. To answer those questions, we are publishing a series of posts on CTI...
View ArticlePart 4: Cyber Threat Intelligence and the Incident Responder
The Part 3 post on this topic is available here. How Incident Responders Use Cyber Threat Intelligence In our previous post we introduced three use cases of how cyber threat intelligence helps incident...
View ArticleThreatScape Media Highlights Update – Week Of December 21st
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleThreatScape Media Highlights Update – Week Of January 6th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleSandworm Team and the Ukrainian Power Authority Attacks
Sandworm Team – Historical Targeting of Ukraine and Interest in SCADA Systems Since last week, iSIGHT Partners has worked to provide details on the power outage in Ukraine to our global customers. We...
View ArticleThreatScape Media Highlights Update – Week Of January 11th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleThreatScape Media Highlights Update – Week Of January 20th
The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence...
View ArticleFireEye Acquires iSIGHT Partners
On January 20, 2016, FireEye® announced the acquisition of iSIGHT Partners®. You can read the press release here. It is rare that an acquisition actually changes the game in the security market. This...
View Article