article thumbnail

What Is Cyber Threat Hunting? (Definition & How it Works)

Tech Republic Security

Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.

article thumbnail

2022 cyber threat report details growing trends

Tech Republic Security

The post 2022 cyber threat report details growing trends appeared first on TechRepublic. SonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The March Madness Cyber Threat

Adam Levin

The post The March Madness Cyber Threat appeared first on Adam Levin. Abandoned or inactive email accounts within an organization provide an easy way into workplace emails for hackers, because unusual activity will go unnoticed. Delete or archive employee emails when they leave the company. .

article thumbnail

Top 7 Cyber Threat Hunting Tools for 2024

Tech Republic Security

Here are the top cyber threat hunting tools that can enhance your organization's cybersecurity defenses. Learn how their features compare.

article thumbnail

Space Systems and IoT: What Are the Biggest Cyber Threats?

Lohrman on Security

In this interview with Dick Wilkinson, CTO at Proof Labs, we explore the cyber threats in space and on the Internet of Things, and how they impact each of us.

article thumbnail

SIM Swapping Is a Growing Cyber Threat — Here’s Help

Lohrman on Security

From cryptocurrency thefts to hacking bank accounts, SIM swapping is a growing threat online. Here are relevant definitions, real-world examples and tips to help stop cyber criminals.

article thumbnail

5 Techniques for Collecting Cyber Threat Intelligence

The Hacker News

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence.