Security Blog

Bret Jordan's picture
Written by
Bret Jordan
The road to blissful cyber threat intelligence sharing often feels like a bumpy dirt track in a Wild West ghost town, but there’s hope on the horizon: A new language, designed to define and describe a broad swath of threat activity, is beginning to take shape. This language, known as STIX, and its transport method, called TAXII, offers security firms, industry, and government the promise of better and faster cyber threat intelligence sharing.
Chris Larsen's picture
Written by
Tim van der Horst

[This is research that Tim presented in our booth at Black Hat earlier this month. --C.L.]

 

Websites come and go over time; rarely is a second thought given to those sites left by the wayside. Recently, the Blue Coat Security Labs team has looked into the nature of the host names that make up the Web, and the fleeting nature of many of them is truly surprising.

Chris Larsen's picture
Written by
Chris Larsen

The chough (pronounced like "chuff") is a member of the crow family, consisting of two species, one with a red bill and one with a yellow bill, that is found mostly in the mountains of southern Eurasia and northern Africa.

Chris Larsen's picture
Written by
Chris Larsen

When I began this blog (almost six years ago, for the internal version!), the dominant threat in the malware landscape was easily Fake Anti-virus -- web sites

Andrew Brandt's picture
Written by
Jeff Doty

It's never a good start to your day when you see something like this from a file you know did not originate with Symantec: