Resource Type: Popular Resources

TAG Cyber Research Article: Understanding Compromise Intelligence

by Ed Amoroso, CEO and Founder, TAG Cyber Compromise intelligence offers cyber defenders a means to utilize cyber threat information about malicious actor behavior to discover and contextualize compromises. Ed Amoroso describes what it is, how it works and to implement this compromise intelligence with Prevailion. Understanding Compromise Intelligence

Next Generation Threat Intelligence and Research: Adversary Counterintelligence

By Sanjay Raja, VP of Marketing Prevailion, Inc. Previous Generation Intelligence and Adversary Hunting A subset of Threat Intelligence or even Threat Hunting using Intelligence called Adversary Intelligence or Adversary Hunting is nothing new. Traditional threat intelligence has focused on Identifying and documenting newly discovered threats Identifying Threat Actor Tactics, Techniques, Procedures (TTPs) Delivering insights […]

Who’s Impacted by TA505 and Why It Matters

While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another sophisticated crime actor that companies need to be watching out for. The group is called TA505 and it is believed to be a Russian criminal operation. However, there may be more to this group’s activities than purely financial […]

Webinar – Undisclosed Breach Intelligence

Prevailion, a global leader in cyber adversary intelligence, today announced that it has been recognized as a Gartner Cool Vendor in the latest Cool Vendors in Security Operations and Threat Intelligence report.

Ransomware crime group known as UNC1878

On the Trail of UNC1878

Since October 28th, Prevailion has been investigating current and potential future victims of the ransomware crime group known as UNC1878. While our investigation is still underway, we have so far identified hundreds of organizations worldwide that show compromise activity by this threat actor, and which may be in the early- to mid-stages of a Ryuk […]

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.