Who Are the Stars of a Threat Intel Team?
Threat intelligence is an important part of managed detection and response (MDR), but it is not just one thing. There are many dedicated specialties that make up a winning threat intel team.
Pervasive Ripple20 Vulnerabilities in IoT Devices
An overview of the risks from the Ripple20 vulnerabilities in IoT devices uncovered by researchers at JSOF and how Alert Logic is helping customers detect and avoid potential threats.
Technical Analysis of CVE-2020-12675
A detailed look at the vulnerability in the MapPress plugin for WordPress discovered by Alert Logic security researchers (CVE-2020-12675).
Threat Hunting and MDR
A recap of a Twitter chat between Jack Danahy and Tom Gorup on the role of threat hunting in MDR and whether it should be counted as Tenet #8 of the MDR Manifesto.
How We Discovered a Vulnerability in MapPress Pro (CVE-2020-12675)
Alert Logic researchers recently discovered a new vulnerability (CVE-2020-12675) in the MapPress Pro plugin while investigating a previous patch.
What is Threat Intelligence?
Threat intelligence plays an important role in effective cybersecurity and in managed detection and response — helping to inform detection efforts and guide efficient response to threats.
Alert Logic Identifies New Vulnerability: CVE-2020-12675 in MapPress Plugin for WordPress
Alert Logic researchers discovered a vulnerability in the MapPress plugin for WordPress and worked with the vendor to address the underlying flaw for CVE-2020-12675.
There Will Always Be Successful Attacks Which Is Why There Must Be MDR
Alert Logic conducted a series of 7 webcasts focused on the essential tenets of managed detection and response (MDR). The first focuses on the need for MDR because no amount of investing in cybersecurity will ever prevent all attacks.
The Attacker Playbook Hasn’t Changed
Businesses still are challenged to address cybersecurity for remote workers, but for attackers, it’s just another day and business as usual.
IT and Security Teams Adjust to New Normal of COVID-19 Quarantine
The third in a series of posts looking at the impact of the COVID-19 quarantine on technology, productivity, cybersecurity, and the threat landscape, and how tips for coping with the new normal.
The Benefits of Giving Up a Little Control over Cybersecurity
The COVID-19 pandemic and shutdown of businesses has forced families to embrace new processes. There are lessons in the Coronavirus quarantine for businesses in terms of giving up control to achieve desired outcomes.
Attackers Prey on Chaos and Confusion of COVID-19
Attackers like to prey on chaos and confusion and use current events as a lure to catch victims. The COVID-19 pandemic is a prime opportunity for attackers to up their game.