Search

Category

Author

Issues

Showing 61 - 70 of 108 Results

CTA News

Looking Back on 2020

Maybe it should be unsurprising that 2020 has no intention of going quietly. By the beginning of December, it had already given us a sudden explosion in remote work, COVID-19 themed lures, a ransomware surge, election disinformation, and 5G deployment battles. Yet, 2020 was not finished. As we head…

Major Incidents

Incident Response Blog: SUNBURST / SolarWinds

On December 13, FireEye and Microsoft released information regarding a newly discovered nation-state campaign actors leveraging access to the SolarWinds Orion Platform. The SolarWinds Orion Platform is used for IT infrastructure management in many government agencies and corporate networks. Nation-state actors compromised the SolarWinds supply chain to trojanize…

Guest Blogs

Fighting Malware Means Strength in Numbers

Written by Scott Lambert, VP of Threat Research, ReversingLabs In 2018, Kirstjen Nielsen, then secretary of the Department of Homeland Security (DHS), spoke at the first-ever National Cyber Security Summit in New York City, where she gave a stark overview of the cyberthreats facing the United States. Her message…

CTA News

Getting to Know CTA: Part 3 — It’s Not Just What You Know, But When

The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we explore in greater depth these various use cases and the common themes that…

Guest Blogs

Support for Cybercrime Victims: The US Is Playing Catch Up

Although nation-state activities in cyberspace often grab the headlines, the majority of malicious cyberactivity comes from cybercrime.  CTA members spend a lot of time and money combating this problem.  That’s one reason why we work with organizations like the Cybercrime Support Network to reduce the effects of cybercrime on…

CTA News

Getting to Know CTA — Part 2: Stronger Security for (Your) Customers

The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we will explore in greater depth these various use cases and the common…

CTA News

Getting to Know CTA: Part 1 — A Community of Practice

The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we will explore in greater depth these various use cases and the common…

Best Practices

Get Your Spidey Sense On

This blog on the importance of staying vigilant online is reposted with permission from the Global Cyber Alliance (GCA). GCA is an international, cross-sector effort dedicated to reducing cyber risk and improving our connected world and we are delighted to be able to work with them as one of our…

CTA News

Threat Intelligence Practitioners Take on a Virtual Virus Bulletin

Earlier this month, CTA was all-hands on deck for the virtual Virus Bulletin conference, aka. ‘vblocalhost,’ where we coordinated and sponsored the Threat Intelligence Practitioners’ Summit (TIPS). TIPS spanned a range of perspectives from different corners of the world and highlighted distinct approaches to threat intelligence. If you…