Logo Threat Intelligence

Improve your security posture 

With Threat Intelligence’s blog you stay up to date with the latest cyber security tips and news

AI in Pen Testing
By Anupama Mukherjee 25 Mar, 2024
In this blog post, we will explore how AI can enhance cybersecurity through pen testing, and the risks of using AI in this way.
AI in Cybersecurity
By Anupama Mukherjee 13 Mar, 2024
In this article, we will discuss the role of AI in protecting digital assets from cybercrime.
IRAP Assessments
By Anupama Mukherjee 07 Mar, 2024
In this blog post, we're breaking down IRAP, who it applies to, and how to achieve it. This content has been created with the help of our Technical GRC Specialist, Sam Panicker.
2024 Cybersecurity Trends
By Anupama Mukherjee 04 Mar, 2024
And as the year draws to a close, the question that remains is: What will the new year hold for the cybersecurity industry? Find out in this blog post!
Network Segmentation
By Threat Intelligence 29 Feb, 2024
Ransomware is on the rise. In 2020, ransomware attacks surged by 150% , with the average attack extorting as much as $170,000 (although cybercriminal groups such as Maze, Egregor, and RagnarLocker extorted much higher amounts of $1-2 million). Ransomware has even been dubbed “ the face of cybercrime in 2020 .” Clearly, this is a lucrative crime, but what is considered ransomware? Ransomware is any number of malicious programs launched by bad actors who then gain unauthorized access to a system. Once they’ve gained access, these criminals then encrypt the victim’s files, denying access until the victim pays a ransom. As you can no doubt imagine, ransomware can be very, very devastating, especially when the attackers target healthcare systems and financial firms, gaining access to medical and PCI data. To mitigate the risks of ransomware and boost their IT security, many organizations are adopting something known as network segmentation. In this article, we will explore various aspects of network segmentation, including: What network segmentation is, What the different types of network segmentation are, and The benefits of network segmentation.
Cybersecurity Gap Analysis
By Threat Intelligence 22 Feb, 2024
We interviewed Sam Panicker, Technical GRC Specialist at Threat Intelligence, for expert insights on cybersecurity gap analysis.
By Threat Intelligence 16 Feb, 2024
In this exclusive interview with cybersecurity expert and the brilliant mind behind our groundbreaking product, Evolve, Ty Miller shares his insights. Join us as we delve into Ty's journey, triumphs, and the story behind Evolve.
Fortinet custom post-breach IOCs
By Threat Intelligence 13 Feb, 2024
Our team performed an investigation on the latest Fortinet vulnerability and developed custom IOCs to detect the exploitation of this vulnerability. Read on to understand the details of this critical security concern and the necessary steps to protect your systems.
By Threat Intelligence 02 Feb, 2024
If your business operates a website, understanding OpenSSL is crucial. In this blog post, we will delve into the fundamentals of OpenSSL, addressing the latest vulnerabilities and imparting insights on securing your data.
Show More
Subscribe to Our Blog

Stay up to date with the latest
cybersecurity tips and news.

Share by: