Cyber Threat Intel

IoTSi public library 

 

 

Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats

While, until recently, cyber operations have constituted a specific subset of defense and security concerns, the synergization of cyberspace and artificial intelligence (AI), which are driving the Fourth Industrial Revolution, has raised the threat level of cyber operations, making them a centerpiece of what are called hybrid threats.

Adversarial Machine Learning

This NIST Trustworthy and Responsible AI report is intended to be a step toward developing a taxonomy and terminology of adversarial machine learning (AML), which in turn may aid in securing applications of artifcial intelligence (AI) against adversarial manipulations of AI systems. Broadly, there are two classes of AI systems: Predictive and Generative.

Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

The “Security Technologies and Methods for Advanced for Advanced Cyber Threat Intelligence, Detection and Mitigation” book builds on the experience of the CyberTrust EU project’s (grant agreement 786698) methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases.

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Log-based cyber threat hunting has emerged asan important solution to counter sophisticated attacks.However, existing approaches require non-trivial efforts of manualquery construction and have overlooked the rich external threatknowledge provided by open-source Cyber Threat Intelligence(OSCTI).

 

The Threat Hunter’s Handbook

Cybersecurity leaders are engaged in a difficult arms race against the threat actors who seek to attack their organizations. Recent years have seen an explosion of budgets and headcount dedicated to cybersecurity, with global spending on information security totaling $124 Billion USD in 2020.1 Despite the spending, however, the metrics are trending in favor of the cyber criminals. The number of reported breaches has increased at an annual rate of nearly 14% over the past five years.2 Costs continue to mount as well, with an average total cost of a breach now exceeding $3.8 million.

 

Ransomware Playbook

Ransomware is a type of malware that denies a user's access to a system or data until a sum of money is paid. It is a serious and evolving threat to Canadians. The impact of ransomware can be devastating to organizations.Vital data and devices can be made inaccessible to organizations, leaving them unable to conduct their business or serve their clients. We have seen an increased number of ransomware attacks affecting Canadian organizations and individuals.

Red Team Handbook

A leader convenes a meeting of the organization’s key personnel and top planners to develop an operational plan for the next year. These people work in the same environment, have received similar training, and share common experiences within a hierarchical framework. The process seems to go smoothly, as most decisions are made based upon what the group believes the leader wants, what the senior personnel suggests, and what everyone knows to be true about the organization and the operational environment. The plan is drafted, accepted, and put into practice.And it fails! Why did it fail, and what could have been done to increase the odds of success?

 

Purple Team Exercise Framework (PTEF)

This document defines a Purple Team Exercise Framework (PTEF) to facilitate the creation of a formal Purple Team Program.Purple Team Exercises are an efficient method to test, measure, and improve your organization’s resilience to an attack. A Purple Team focuses on fostering collaboration with your entire security stack including people, process, and technology.

How Can Cyber Threat Prediction Improve Cybersecurity Posture?

 Organizations across the world have been continuously targeted by sophisticated, disruptive, damaging, and costly cyber-attacks. To address the aforementioned issue, security efforts have focused on how to prevent, detect, and recover from an attack.However, these efforts are defensive, reactive, and inefficient at stopping the damage as they only deal with the attacks after they occur. In recent years, the cybersecurity community has started adopting a proactive approach that aims to predict the likelihood of cyber threats, anticipate the cyber-attacks in advance, and avoid their damages

Design and implementation of Visualization Tool for Terrorist & Cyber Threat Detection and prevention in Nigeria

The digital age also has had implications on the protection of physical assets, such as property, buildings and individuals.Law enforcement agencies must be able to respond to threats by leveraging timely information for a set of predefined behaviors, such as people, vehicles or objects crossing tripwire or entering a secured area. They must be able to identify and correlate incidents, social media analytics, video surveillance, geospatial records, sensor data or any other source of data in motion to proactively identify and monitor potential incidents and......

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence

Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat
intelligence include improved efficiency and effectiveness in secu-rity operations in terms of detective and preventive capabilities.
Successful threat intelligence within the cyber domain demands a knowledge base of threat information and an expressive way
to represent this knowledge. 

 

Cyber Threat Intelligence

Cyber threat intelligence” sounds like a glamorous mashup of James Bond and Bill Gates, or perhaps Jason Bourne and Mark Zuckerberg. Indeed, today’s headlines reveal a surprising number of master criminals and shadowy government agencies bent on world domination.Instead of stolen atomic devices, giant lasers, and exotic aircraft, they wield phishing campaigns, polymorphic malware, and DDoS attacks.