Mar 25 2020

Threat Simulation Overview and Setup – Active Countermeasures

Category: Cyber Threats,Threat detection,Threat ModelingDISC @ 11:50 am

Intro: No software project is complete without testing. In this blog series, we’ll cover how to test if your Threat Hunting platform can detect common threats.[…]

Source: Threat Simulation Overview and Setup – Active Countermeasures

Why You Need Threat Hunting!
httpv://www.youtube.com/watch?v=sKQHJhd-YWE

Cyber Threat Hunting: Identify and Hunt Down Intruders
httpv://www.youtube.com/watch?v=60pyxA0U9EQ

Real-Time Threat Hunting – SANS Threat Hunting & Incident Response Summit 2017
httpv://www.youtube.com/watch?v=TTbZd0he94U

Detecting Malware Beacons with Zeek and RITA
httpv://www.youtube.com/watch?v=eETUi-AZYgc





Subscribe to DISC InfoSec blog by Email


Dec 15 2019

Global Threat Detection Report

Category: Cyber Threats,Threat detectionDISC @ 1:22 pm



2019 Global Threat Detection Report

2019 Global Threat Detection Report

via CrowdStrike





The best practice guide for an effective infoSec function

Practice Guide

Open a PDF file 2019 Global Threat Detection Report.




2019 Global Threat Report- The 1-10-60 Rule
httpv://www.youtube.com/watch?v=y70R2vUbvls

World Economic Forum Global Risks Report 2019
httpv://www.youtube.com/watch?v=kwQMsBWd-jo


“Threat Detection & Prevention” appliances




Subscribe to DISC InfoSec blog by Email


Jul 22 2019

What is Cyber Threat Intelligence

Category: Cyber ThreatsDISC @ 2:45 pm

What is Cyber Threat Intelligence and How is it used?

 

 

Threat Intelligence At Microsoft: A Look Inside – Cyber Threat Intelligence Summit

 

Security Threat Tables

Live Cyber Attack Threat Map

World’s Biggest Data Breaches & Hacks

 

Check if you have an account that has been compromised in a data breach

 


Enter your email address:

Delivered by FeedBurner


May 16 2019

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Category: Cyber ThreatsDISC @ 10:52 am

Microsoft has renewed its Attack Surface Analyzer tool (version 2.0) to take advantage of modern, cross-platform technologies.

Source: Microsoft renewed its Attack Surface Analyzer, version 2.0 is online


 Subscribe in a reader

Tags: Cyber Threat


Jul 08 2011

How to protect ourselves from Payment Fraud

Category: Cyber Threats,Cybercrime,pci dssDISC @ 11:26 pm

Some basic advice has been issued by Apacs, and includes:

    * Don’t let your cards or your card details out of your sight when making a transaction
    * Do not keep your passwords, login details or Pins written down
    * Do not disclose Pins, login details or passwords in response to unsolicited emails
    * Only divulge card details over the phone when you have made the call or when you are familiar with the company
    * Access internet banking or shopping sites by typing the address into your browser. Never enter your personal details on a website you have accessed via a link from an e-mail
    * Shop at secure websites by checking that the security icon is showing in your browser window (a locked padlock or an unbroken key)
    * Always log out after shopping and save the confirmation e-mail as a record of your purchase

      For more advice you can visit:

      Spotting and avoid common scams, fraud and schemes online and offline

      How the scam works and what you need to do about it.

      and

      Online payment Security and Fraud Prevention

      Tags: Australia, Business, Credit card, Financial services, fraud, Internet fraud, Online banking


      « Previous Page