Month: March 2021

The Newest Advancement Against Threat Actors: Compromise & Target Intelligence Realized

by Will Gragido – Chief Strategy Officer, Prevailion What You Need and Why You Need It Target intelligence is intelligence that is derived from a unique tradecraft driven counterintelligence approach that empowers security teams with immediately actionable evidence of compromise (EoC). An uncommon capability whose time has arrived after decades of failed promise and often bitter […]

What’s Below the Surface of IcedID?

Banking Trojans are a dime a dozen, making it difficult to keep track of the myriad ways that an adversary can drop a payload. We recently wrote about Ramnit, a Trojan botnet, which has evolved over time. Similarly, another Trojan targeting the financial sector, IcedID, also known as BokBot, was discovered in 2017 by IBM […]

Point out Risk Scores are useless

The Ugly Truth About Risk Scores and Threat Intelligence

Whether it’s vendors that provide an external grade/score of a company’s risk, threat intelligence platforms or vulnerability management vendors, everyone is looking for the ultimate “risk score”. A Risk Score is like a home inspection report. It makes us feel like we are making good decisions in buying a new home by telling us what […]

The Growing Attack Surface in Connected Cars

As innovation in the auto industry speeds up, new technology is paving the way for an expanded attack surface, which is a growing concern. Beyond the connected features in infotainment systems, trends in connected cars are shifting into overdrive. What does that mean for attackers? Unfortunately, it’s a question everyone has to ask as cars […]

How Vulnerable Are America’s Utilities?

Undoubtedly, news that a Florida water plant had been hacked raised a lot of alarms outside the cybersecurity industry. The idea that a water source could be contaminated hit home for many Americans, highlighting the vulnerability of the nation’s utilities and critical infrastructure. But this attack came as no surprise to security experts. It was […]

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.