Quantcast
Channel: Cyber Threat Alliance
Browsing all 72 articles
Browse latest View live

Incident Response Blog: Exploitation of Microsoft Exchange Vulnerabilities

During recent weeks, cybersecurity providers, businesses, governments, and other organizations have been responding to the publicization of four zero-day vulnerabilities affecting Microsoft Exchange...

View Article



Stronger Together

In this blog post, we look at what our members have been saying, through guest blogs and profiles in CTA’s quarterly newsletter, about how we are delivering on the core aspects of our mission:...

View Article

CTA: A Trusted Environment

The Cyber Threat Alliance (CTA) Sharing Model relies on our organization’s status as a trusted environment for all of our private-sector members, as well as public sector and civil society partners....

View Article

Implementing the Ransomware Task Force’s Recommendations in the Cybersecurity...

This week, the Ransomware Task Force released its report on combating ransomware.  The RTF, sponsored by the Institute for Security & Technology, is made up of more than 50 expert volunteers from...

View Article

Updating the 2020 Summer Olympics Threat Assessment

The Cyber Threat Alliance (CTA) released our first threat assessment focusing on the 2020 Summer Olympics in Tokyo way back in February 2020. Around the release date, we were seeing stories of a novel...

View Article


Pandemic Acceleration: the changing relationship with web-based technology

By Jon-Louis Heimerl, CISSP, Sr. Manager, Threat Intelligence Communications, NTT Ltd. As 2020 drew to a close, NTT Ltd worked on our annual Global Threat Intelligence Report (GTIR). The data showed...

View Article

Combating Botnets through Consumer IoT Cybersecurity Labeling

By: Yongjia Chen, Dathan Duplichen, Andrew Shu, Anna Nguyen Yip   Although the ransomware threat currently gets the most attention, botnets remain a significant problem in the digital ecosystem. As...

View Article

Incident Response Blog: REvil Ransomware Campaign Targeting Kaseya VSA Customers

On Friday, 2 July, CTA members became aware of a ransomware campaign targeting Kaseya’s VSA product. VSA is used by Managed Service Providers (MSPs) to monitor and manage information technology for...

View Article


4 Post-Pandemic Cybersecurity Trends

By Carol Hildebrand, Senior Writer, Security, NETSCOUT The COVID-19 pandemic handed some Herculean tasks to many enterprise IT and cybersecurity teams.  First, IT had to adjust architectures and...

View Article


CTA Board of Directors Spotlight: John Petrie, NTT

The Cyber Threat Alliance is beginning a blog series profiling our board of directors. Our intent is to showcase the interesting and impactful cyber industry leaders helping to drive CTA. We want our...

View Article

CTA Board of Directors Spotlight: Corey Thomas, Rapid7

The Cyber Threat Alliance is beginning a blog series profiling our board of directors. Our intent is to showcase the interesting and impactful cyber industry leaders helping to drive CTA. We want our...

View Article

CTA’s GIANT-SIZED ANNIVERSARY ISSUE – Early Share #500

When you read superhero comics, you know something exciting is going to happen when you get an issue with a milestone number, like 100, 250, or 500. Those anniversary issues are always giant-sized and...

View Article

Cybersecurity Awareness Month – Getting Familiar with Cyber Basics

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Get Familiar with the Cyber Basics At a time when we are more connected than ever, being “cyber smart” is of the utmost...

View Article


CTA Board of Directors Spotlight: Dorit Dor, Check Point Software Technologies

As the digital world becomes a bigger part of all of our lives, cyber criminals are becoming more prevalent and working together (including state-sponsored attacks) to wreak havoc on all of us,...

View Article

Shoring Up Your Phishing Defenses

BY THE NATIONAL CYBER SECURITY ALLIANCE, A PARTNER OF THE CYBER THREAT ALLIANCE From ransomware to SolarWinds, the cybersecurity space has been as hectic as ever over the last 12-24 months. However,...

View Article


THE POWER OF PARTNERSHIPS

By Devin Lynch, Senior Director, Policy & Government Affairs, SecurityScorecard As CISA’s 4th Annual National Cybersecurity Summit concludes this week, the theme for the final day is “The Power of...

View Article

Prioritizing Cybersecurity in a Hybrid Workplace

By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Today, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means...

View Article


3 Aspects to Managing Systemic Cyber Risk

This blog on the importance of managing systemic cyber risk is reposted with permission from NETSCOUT, a Contributing Member of the Cyber Threat Alliance. This blog was authored by Michael Daniel, CTA...

View Article

Cyber Threat Intelligence: Teaming up for ever more secure cybersecurity

By the TEHTRIS Team TEHTRIS understands that there is strength in numbers and has chosen to join the Cyber Threat Alliance, alongside other experts in the field, to share our unique, high value-added...

View Article

Incident Response Blog: Log4J

A zero-day vulnerability (CVE-2021-44228) has been discovered in Apache Log4j. Apache Log4j is a java-based logging utility. It is widely used in cloud and enterprise software services. Exploit code...

View Article
Browsing all 72 articles
Browse latest View live




Latest Images