Top IT Security Bloggers

Graham Cluley
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner "Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Swisscom data breach exposes 800,000 customers

    Graham Cluley
    Swiss telecoms giant Swisscom has admitted that it suffered a serious security breach in the autumn of 2017 that saw the theft of contact details of approximately 800,000 customers - most of whom were mobile subscribers.
    Read more in my article on the Tripwire State of Security blog.
  • Smashing Security #064: So just a 'teeny tiny' security issue then?

    Graham Cluley
    A Namecheap vulnerability allows strangers to make subdomains for your website, Troy Hunt examines password length, and ex-Google and Facebook employees are fighting to protect kids from social media addiction.
    All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest HaveIBeenPwned's Troy Hunt.
  • WordPress update stopped WordPress automatic updates from working. So update now

    Graham Cluley
    Automatic updates are a great thing. Just so long as they actually automatically update.
  • Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
    And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
    Which means that you will be able to benefit from a daily update of the following:

    Information Security Headlines: Top trending news stories.
    Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
    Top Hackers: Organizations and people recognized as hackers by Recorded Future.
    Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
    Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

    Infosec professionals agree that the Cyber Daily is an essential tool:
    "I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.
    So, what are you waiting for?
    Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • One year later, the UK's Active Cyber Defence is seeing good results

    Graham Cluley
    The National Cyber Security Centre (NCSC), which tasks itself with "helping to make the UK the safest place to live and do business online", has published an impressive report into the progress it has made with what it calls its "Active Cyber Defence" programme.
  • Security hole meant Grammarly would fix your typos, but let snoopers read your every word

    Graham Cluley
    A Google vulnerability researcher has found a gaping security hole in a popular web browser extension, that could have potentially exposed your private writings on the internet.
    Read more in my article on the Hot for Security blog.
  • Lauri Love won't be extradited to the United States to face hacking charges

    Graham Cluley
    There has been a major development in the long-running fight by British student Lauri Love to avoid extradition to the United States, where he has been accused of hacking into various government websites.
  • It's time to say 'Welcome to dumpsville Adobe Flash', as new unpatched flaw exploited by criminals

    Graham Cluley
    It's time to call an end to what can best be called a rocky relationship.
  • Smominru! Half a million PCs hit by cryptomining botnet

    Graham Cluley
    Why go to all the bother of writing ransomware that demands victims pay a Bitcoin ransom? If all you want is cryptocurrency, why not use the infected computers to mine the crypto coins themselves?
    Read more in my article on the Tripwire State of Security blog.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release