Incident Response Blog: Exploitation of Microsoft Exchange Vulnerabilities
During recent weeks, cybersecurity providers, businesses, governments, and other organizations have been responding to the publicization of four zero-day vulnerabilities affecting Microsoft Exchange...
View ArticleStronger Together
In this blog post, we look at what our members have been saying, through guest blogs and profiles in CTA’s quarterly newsletter, about how we are delivering on the core aspects of our mission:...
View ArticleCTA: A Trusted Environment
The Cyber Threat Alliance (CTA) Sharing Model relies on our organization’s status as a trusted environment for all of our private-sector members, as well as public sector and civil society partners....
View ArticleImplementing the Ransomware Task Force’s Recommendations in the Cybersecurity...
This week, the Ransomware Task Force released its report on combating ransomware. The RTF, sponsored by the Institute for Security & Technology, is made up of more than 50 expert volunteers from...
View ArticleUpdating the 2020 Summer Olympics Threat Assessment
The Cyber Threat Alliance (CTA) released our first threat assessment focusing on the 2020 Summer Olympics in Tokyo way back in February 2020. Around the release date, we were seeing stories of a novel...
View ArticlePandemic Acceleration: the changing relationship with web-based technology
By Jon-Louis Heimerl, CISSP, Sr. Manager, Threat Intelligence Communications, NTT Ltd. As 2020 drew to a close, NTT Ltd worked on our annual Global Threat Intelligence Report (GTIR). The data showed...
View ArticleCombating Botnets through Consumer IoT Cybersecurity Labeling
By: Yongjia Chen, Dathan Duplichen, Andrew Shu, Anna Nguyen Yip Although the ransomware threat currently gets the most attention, botnets remain a significant problem in the digital ecosystem. As...
View ArticleIncident Response Blog: REvil Ransomware Campaign Targeting Kaseya VSA Customers
On Friday, 2 July, CTA members became aware of a ransomware campaign targeting Kaseya’s VSA product. VSA is used by Managed Service Providers (MSPs) to monitor and manage information technology for...
View Article4 Post-Pandemic Cybersecurity Trends
By Carol Hildebrand, Senior Writer, Security, NETSCOUT The COVID-19 pandemic handed some Herculean tasks to many enterprise IT and cybersecurity teams. First, IT had to adjust architectures and...
View ArticleCTA Board of Directors Spotlight: John Petrie, NTT
The Cyber Threat Alliance is beginning a blog series profiling our board of directors. Our intent is to showcase the interesting and impactful cyber industry leaders helping to drive CTA. We want our...
View ArticleCTA Board of Directors Spotlight: Corey Thomas, Rapid7
The Cyber Threat Alliance is beginning a blog series profiling our board of directors. Our intent is to showcase the interesting and impactful cyber industry leaders helping to drive CTA. We want our...
View ArticleCTA’s GIANT-SIZED ANNIVERSARY ISSUE – Early Share #500
When you read superhero comics, you know something exciting is going to happen when you get an issue with a milestone number, like 100, 250, or 500. Those anniversary issues are always giant-sized and...
View ArticleCybersecurity Awareness Month – Getting Familiar with Cyber Basics
By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Get Familiar with the Cyber Basics At a time when we are more connected than ever, being “cyber smart” is of the utmost...
View ArticleCTA Board of Directors Spotlight: Dorit Dor, Check Point Software Technologies
As the digital world becomes a bigger part of all of our lives, cyber criminals are becoming more prevalent and working together (including state-sponsored attacks) to wreak havoc on all of us,...
View ArticleShoring Up Your Phishing Defenses
BY THE NATIONAL CYBER SECURITY ALLIANCE, A PARTNER OF THE CYBER THREAT ALLIANCE From ransomware to SolarWinds, the cybersecurity space has been as hectic as ever over the last 12-24 months. However,...
View ArticleTHE POWER OF PARTNERSHIPS
By Devin Lynch, Senior Director, Policy & Government Affairs, SecurityScorecard As CISA’s 4th Annual National Cybersecurity Summit concludes this week, the theme for the final day is “The Power of...
View ArticlePrioritizing Cybersecurity in a Hybrid Workplace
By the National Cyber Security Alliance, a partner of the Cyber Threat Alliance Today, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means...
View Article3 Aspects to Managing Systemic Cyber Risk
This blog on the importance of managing systemic cyber risk is reposted with permission from NETSCOUT, a Contributing Member of the Cyber Threat Alliance. This blog was authored by Michael Daniel, CTA...
View ArticleCyber Threat Intelligence: Teaming up for ever more secure cybersecurity
By the TEHTRIS Team TEHTRIS understands that there is strength in numbers and has chosen to join the Cyber Threat Alliance, alongside other experts in the field, to share our unique, high value-added...
View ArticleIncident Response Blog: Log4J
A zero-day vulnerability (CVE-2021-44228) has been discovered in Apache Log4j. Apache Log4j is a java-based logging utility. It is widely used in cloud and enterprise software services. Exploit code...
View Article
More Pages to Explore .....