Search

Category

Author

Issues

Showing 51 - 60 of 109 Results

The Industry

Combating Botnets through Consumer IoT Cybersecurity Labeling

Written by: Yongjia Chen, Dathan Duplichen, Andrew Shu, Anna Nguyen Yip Although the ransomware threat currently gets the most attention, botnets remain a significant problem in the digital ecosystem. As part of our capstone project in the Master’s in International Policy degree program at Stanford’s Freeman Spogli Institute for International…

Guest Blogs

Pandemic Acceleration: the changing relationship with web-based technology

Written by Jon-Louis Heimerl, CISSP, Sr. Manager, Threat Intelligence Communications, NTT Ltd. As 2020 drew to a close, NTT Ltd worked on our annual Global Threat Intelligence Report (GTIR). The data showed some interesting results, so I asked Michael Daniel what kind of impact he thought COVID-19 was having on…

CTA News

Updating the 2020 Summer Olympics Threat Assessment

The Cyber Threat Alliance (CTA) released our first threat assessment focusing on the 2020 Summer Olympics in Tokyo way back in February 2020. Around the release date, we were seeing stories of a novel coronavirus beginning to spread. Some of us were starting to get concerned about it here in…

The Industry

Implementing the Ransomware Task Force’s Recommendations in the Cybersecurity Industry

This week, the Ransomware Task Force released its report on combating ransomware.  The RTF, sponsored by the Institute for Security & Technology, is made up of more than 50 expert volunteers from software companies, cybersecurity vendors, government agencies, non-profits, and academic institutions.  The Task Force’s report is timely and its…

CTA News

CTA: A Trusted Environment

The Cyber Threat Alliance (CTA) Sharing Model relies on our organization’s status as a trusted environment for all of our private-sector members, as well as public sector and civil society partners. That trust also allows us to do so much more. The fact that all of CTA’s private-sector…

Major Incidents

Incident Response Blog: Exploitation of Microsoft Exchange Vulnerabilities

During recent weeks, cybersecurity providers, businesses, governments, and other organizations have been responding to the publicization of four zero-day vulnerabilities affecting Microsoft Exchange Servers (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065). On March 2, Microsoft released emergency, out-of-band security updates to address these vulnerabilities, which affect a…

Best Practices

Government Handling of Zero-Days: More Sunlight, Fewer Shadows

This post was originally authored by Josh Kenway. To say the least, 2020 was a turbulent year. While certain governments responded to the spread of COVID-19 more effectively than others, the pandemic’s disruptive impact on human society is sure to linger well into this new decade. The paramount importance of…

CTA News

Data Diversity: The CTA Advantage

Despite the general turbulence unleashed by the COVID-19 pandemic, CTA has continued over the last year to mature as an organization in terms of both our threat intelligence sharing and membership growth. Of course, these two aspects are closely intertwined. Because our membership rules require all CTA members to share,…

Guest Blogs

A Matter of Trust

Written by Derek Manky, Chief of Security Insights & Global Threat Alliances, Fortinet’s FortiGuard Labs With the 4th anniversary of the Cyber Threat Alliance (CTA) having just occurred, I got to thinking about how the CTA started. Not with the incorporation of the organization in 2017, but with the…