by Julian DeFronzo | Mar 28, 2017 | Blog, Cybersecurity, Threat Intelligence
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks POSTED BY JULIAN DEFRONZO Part I: MongoDB Over the past few months, there has been a rise in ransomware-like attacks against many popular NoSQL databases, including MongoDB, Elasticsearch, and...
by ThreatQ | Mar 27, 2017 | Blog, Corporate
Bridging the Gap: Come See the ThreatQuotient Team at SINET ITSEF 2017 POSTED BY THREATQ The ThreatQuotient crash is taking on SINET ITSEF this week in Mountain View, CA. We know a few things about cyber threat intelligence (CTI) and threat intelligence...
by Mike Clark | Mar 23, 2017 | Blog, Threat Intelligence
How to Use ThreatQ to Defend Against Ransomware POSTED BY MIKE CLARK Ransomware is still a major money maker for cyber criminals and victims are all over the board, ranging from individuals to major corporations. The attack isn’t complex and revolves around a very...
by Kevin Libby | Mar 20, 2017 | Blog, Threat Intelligence
How to Leverage the ThreatQ Threat Library Using Carbon Black POSTED BY KEVIN LIBBY You’ve got mail.This is not only a title to a movie that I’d prefer not to ever watch again. It’s also the tip of the spear of what could be a greater campaign by an adversary...