This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Who's Using Cyber Threat Intelligence

The following is external content provided as a free resource for blog readers.
We've seen the “commercialization” of malware, with attack kits available on underground forums for anyone who wants to perpetrate a variety of attacks. Large botnets are available for rent, allowing attackers to send spam or launch DDoS attacks at will. Many attackers reuse malware and command and control protocols and methods, adapting their “products” over time to keep ahead of the antimalware industry and security professionals. As more and more attacks occur, however, the likelihood increases that some organization or group has seen the attack before.

Request Free!

No comments:

Post a Comment