Top IT Security Bloggers

Graham Cluley
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Text bombs and ‘Black Dots of Death’ plague WhatsApp and iMessage users

    Graham Cluley
    Please don’t be tempted to try any of these text bomb attack out on anyone else, even as a prank. It’s simply not funny.
    Read more in my article on the Hot for Security blog.
  • Zero-day flaw exploited in targeted attacks is fixed by Microsoft

    Graham Cluley
    This month’s Patch Tuesday bundle of updates from Microsoft included a fix for a critical vulnerability that has been actively exploited by at least one hacking gang in targeted attacks.
    Read more in my article on the Tripwire State of Security blog.
  • Data breach disclosure is still taking too long, report reveals as GDPR looms

    Graham Cluley
    The accepted wisdom in the field of cybersecurity is that things are getting worse, and that more businesses are losing control of more data than ever before.
    What a bunch of pessimists we are… The truth, however, might be rather different.
    Read more in my article on the Bitdefender Business Insights blog.
  • Paris Hilton’s hacker sentenced to 57 months in prison

    Graham Cluley
    Celebrity heiress Paris Hilton says she no longer trusts the iCloud.
  • Smashing Security #077: Why Paris Hilton doesn’t use iCloud, lottery hacking, and Facebook dating

    Graham Cluley
    The tricky-to-pronounce Paytsar Bkhchadzhyan is jailed for hacking Paris Hilton, we hear the story of the man who hacked the lottery and almost got away with $16.5 million, and Facebook thinks it is the perfect partner to find you a date.
    Find out in this special splinter episode of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Dave Bittner from The Cyberwire podcast.
  • Drupe app removed from Google Play store after photos and messages leaked publicly

    Graham Cluley
    A popular Android app called Drupe, downloaded over 10 million times, has been leaving users’ selfie snapshots, audio messages, and other sensitive data exposed for anybody to see.
    Read more in my article on the Hot for Security blog.
  • Cryptomining with JavaScript in an Excel spreadsheet

    Graham Cluley
    It didn’t take long at all for a security researcher to demonstrate how easy it was to turn an Excel spreadsheet into a cryptomining machine.
  • Bad guys have something new to play with! Microsoft Excel adds support for JavaScript

    Graham Cluley
    Microsoft has launched some new features in its Excel spreadsheet software that will boost its power. But will that only be for the benefit of users?
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release