Threat Intel

Sources Most of the resources listed below provide lists and/or APIs to obtain (hopefully) up-to-date information with regards to threats. Some consider these sources as threat intelligence, opinions differ however. A certain amount of (domain- or business-specific) analysis is necessary to create true threat intelligence. AbuseIPDB AbuseIPDB is a project dedicated to helping combat the…

Threat Intelligence Platforms: Navigating the Evolving Landscape

  In the ever-shifting domain of cybersecurity, new threats and vulnerabilities emerge incessantly. For security analysts, the pivotal strategy to stay ahead is through meticulous analysis of these threats. However, the challenge lies in efficiently parsing and extracting actionable insights from the deluge of data sourced from myriad channels. Traditional cybersecurity tools like antivirus software,…

Understanding the November 2023 Updates to the ACSC’s Essential 8 Maturity Model

  The Australian Signals Directorate (ASD) has recently updated its Essential Eight Maturity Model, reflecting the evolving cybersecurity landscape and the need for more robust defenses against increasingly sophisticated threats. Below is an overview and analysis of the key changes made in November 2023, highlighting their significance and implications for organizations striving to enhance their…

Cyber Threat Landscape: Insights from the ASD Cyber Threat Report 2022-2023

The Australian Signals Directorate (ASD) Cyber Threat Report for the fiscal year 2022-23 presents a detailed analysis of the cyber threats facing Australia. The report underscores the persistent risk posed by malicious cyber activities to the nation’s security and prosperity. Key Findings Malicious Cyber Activity: Australia’s networks faced regular targeting by both opportunistic and deliberate…

How to Achieve ACSC Essential 8

How To Achieve ACSC Essential 8 Maturity Level 3 In today’s rapidly evolving digital landscape, cybersecurity has emerged as a paramount concern for organizations worldwide. With cyber threats becoming increasingly sophisticated, it’s imperative for businesses to adopt robust security measures to safeguard their critical assets. The Australian Cyber Security Centre (ACSC), a pivotal entity in…

Tenable Vulnerability Management Best Practices

Introduction In the rapidly evolving landscape of cyber threats, organizations of all sizes face a relentless barrage of potential vulnerabilities. These vulnerabilities, if left unaddressed, can serve as entry points for malicious actors, leading to data breaches, financial losses, and reputational damage. As cyber threats grow in complexity, so does the need for robust vulnerability…

Today’s Biggest Cyber Security Challenges

Today’s Biggest Cyber Security Challenges: Navigating the Digital Minefield The digital age, while bringing about unprecedented connectivity and convenience, has also ushered in a new era of cyber threats. From ransomware attacks that cripple infrastructure to phishing schemes that exploit human vulnerabilities, the cyber landscape is fraught with challenges. Let’s delve into some of the…

A Quick Look at ISA/IEC 62443

A Quick Look at ISA/IEC 62443 Hello, cybersecurity enthusiasts! If you’re in the industrial automation and control systems (IACS) space, or even if you’re just a cybersecurity professional looking to broaden your knowledge, you’ve probably heard of the ISA/IEC 62443 standards. Today, we’re diving deep into this topic to give you an exhaustive understanding of…