IOCs – Gotta Catch ‘Em All?

What is an IOC? Indicators of Compromise, shortened to IOCs, are relatively varied, but generally constitute the URLs, domain names, and IP hashes (MD5, SHA256, SSDEEP) that are associated with a particular malware sample. When we analyse malware, we ‘extract’ the IOCs. In doing so, we want to establish what domains or IPs the malware …

IOCs – Gotta Catch ‘Em All? Read More »

Geopolitics and Cybersecurity Weekly – 24 August 2020

Attacks and cybersecurity news Japanese business technology organisation Konica Minolta was hit with a ransomware attack towards the end of July: its services were impacted for almost a week. Researchers obtained a copy of the ransom note and established that the attackers deployed RansomEXX. It is not believed that this malware steals user data before …

Geopolitics and Cybersecurity Weekly – 24 August 2020 Read More »

Cyjax Geopolitical Podcast – July 2020 – The Blog

This month, Cyjax CISO, Ian Thornton-Trump, and Head of Editorial, Tristan de Souza, tackle Russian interference, threat intelligence failure, a Microsoft vulnerability with – shock, horror – wormable potential, the hijacks of numerous high-profile Twitter accounts, and a chat app being used for cyber-espionage in the Middle East. All of our previous podcasts and blogs …

Cyjax Geopolitical Podcast – July 2020 – The Blog Read More »

2020 Mid-Year CISO Report

Introduction It is imperative to understand the threats and vulnerabilities facing one’s organisation to mitigate the associated risk of a cyberattack. We are regularly asked to define the biggest cybersecurity challenges. Inevitably, they are the same: vulnerability management to reduce the attack surface; phishing attacks (which still account for over 90% of initial compromise and …

2020 Mid-Year CISO Report Read More »

The Cyber Threat Intelligence Analyst – Speaking Your Languge

One issue that is raised frequently is the way in which security or IT teams struggle to speak the “business language” to members of the senior leadership that take the final decisions on spending and investment. This problem could have its roots in IT – and later security – teams historically having their management lines …

The Cyber Threat Intelligence Analyst – Speaking Your Languge Read More »

Scroll to Top