ThreatConnect
ThreatConnect is a cyber-security firm based in Arlington, Virginia. They provide a Threat Intelligence Platform for companies to aggregate and act upon threat intelligence. History The firm was founded in 2011 as Cyber Squared Inc. by Adam Vincent, Richard Barger, Andrew Pendergast and Leigh Reichel. They renamed to ThreatConnect after their series A funding of $4 million in 2014, and in December 2015 obtained series B funding of $16 million. The company gained attention when it linked the Anthem medical data breach to Chinese government-sponsored entities. According to cybercrime expert Brian Krebs, ThreatConnect identified domains used by the group that were intentionally similar to legitimate domains used by Anthem. They also linked Guccifer 2.0, responsible for the 2016 Democratic National Committee email leak, to the Russian-backed cyberespionage group Fancy Bear. Further cyberattacks they attributed to Fancy Bear include against a group investigating the Malaysia Airli ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Fancy Bear
Fancy Bear is a Russian cyber espionage group. American cybersecurity firm CrowdStrike has stated with a medium level of confidence that it is associated with the Russian military intelligence agency GRU. The UK's Foreign and Commonwealth Office as well as security firms SecureWorks, ThreatConnect, and Mandiant, have also said the group is sponsored by the Russian government. In 2018, an indictment by the United States Special Counsel identified Fancy Bear as GRU Unit 26165. This refers to its unified Military Unit Number of the Russian army regiments. Fancy Bear is classified by FireEye as an advanced persistent threat. Among other things, it uses zero-day exploits, spear phishing and malware to compromise targets. The group promotes the political interests of the Russian government, and is known for hacking Democratic National Committee emails to attempt to influence the outcome of the United States 2016 presidential elections. The name "Fancy Bear" comes from a coding sy ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Threat Intelligence Platform
Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation. A true TIP differs from typical enterprise security products in that it is a system that can be programmed by outside developers, in particular, users of the platform. TIPs can also use APIs to gather data to generate configuration analysis, Whois information, reverse IP lookup, website content a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
2016 Democratic National Committee Email Leak
The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails Democratic National Committee cyber attacks, stolen by one or more hackers operating under the pseudonym "Guccifer 2.0" who are alleged to be Russian intelligence agency hackers, according to indictments carried out by the Mueller special counsel investigation, Mueller investigation. These emails were subsequently Internet leak, leaked by DCLeaks in June and July 2016 and by WikiLeaks#Allegations of anti-Clinton and pro-Trump bias, WikiLeaks on July 22, 2016, just before the 2016 Democratic National Convention. This collection included 19,252 emails and 8,034 attachments from the DNC, the governing body of the United States Democratic Party (United States), Democratic Party. The leak includes emails from seven key DNC staff members dating from January 2015 to May 2016. On November 6, 2016, WikiLeaks released a second batch of DNC emails, adding 8,263 emails to its collect ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Guccifer 2
"Guccifer 2.0" is a persona which claimed to be the hacker(s) who gained unauthorized access to the Democratic National Committee (DNC) computer network and then leaked its documents to the media, the website WikiLeaks, and a conference event. Some of the documents "Guccifer 2.0" released to the media appear to be forgeries cobbled together from public information and previous hacks, which had been mixed with disinformation. According to indictments in February 2018, the persona is operated by Russian military intelligence agency GRU. On July 13, 2018, Special Counsel Robert Mueller indicted 12 GRU agents for allegedly perpetrating the cyberattacks. The U.S. Intelligence Community assessed with high confidence that some of the genuine leaks from "Guccifer 2.0" were part of a series of cyberattacks on the DNC committed by two Russian military intelligence groups, and that "Guccifer 2.0" is actually a persona created by Russian intelligence services to cover for their interf ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cyber-security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The significance of the field stems from the expanded reliance on computer systems, the Internet, and wireless network standards. Its importance is further amplified by the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity has emerged as one of the most significant new challenges facing the contemporary world, due to both the complexity of information systems and the societies they support. Security is particularly crucial for systems that govern large-scale systems ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Arlington, Virginia
Arlington County, or simply Arlington, is a County (United States), county in the U.S. state of Virginia. The county is located in Northern Virginia on the southwestern bank of the Potomac River directly across from Washington, D.C., the national capital. Arlington County is coextensive with the United States Census Bureau, U.S. Census Bureau's census-designated place of Arlington. Arlington County is the eighth-most populous county in the Washington metropolitan area with a population of 238,643 as of the 2020 United States census, 2020 census. If Arlington County were incorporated as a city, it would rank as the third-most populous city in the state. With a land area of , Arlington County is the geographically smallest Administrative divisions of Virginia, self-governing county in the nation. Arlington County is home to the Pentagon, the world's second-largest office structure, which houses the headquarters of the United States Department of Defense, U.S. Department of Defe ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Series A Funding
A series A is the name typically given to a company's first significant round of venture capital financing. It can be followed by the word round, investment or financing. The name refers to the class of preferred stock sold to investors in exchange for their investment. It is usually the first series of stock after the common stock and common stock options issued to company founders, employees, friends and family and angel investors. Series A rounds are traditionally a critical stage in the funding of new companies. Series A investors typically purchase 10% to 30% of the company. The capital raised during a series A is usually intended to capitalize the company for 6 months to 2 years as it develops its products, performs initial marketing and branding, hires its initial employees, and otherwise undertakes early stage business operations. It may be followed by more rounds ( Series B, Series C, etc). Sources of capital Because there are no public exchanges listing their sec ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Anthem Medical Data Breach
The Anthem medical data breach was a medical data breach of information held by Elevance Health, known at that time as Anthem Inc. On February 4, 2015, Anthem, Inc. disclosed that criminal hackers had broken into its servers and had potentially stolen over 37.5 million records that contain personally identifiable information from its servers. On February 24, 2015 Anthem raised the number to 78.8 million people whose personal information had been affected. According to Anthem, Inc., the data breach extended into multiple brands Anthem, Inc. uses to market its healthcare plans, including, Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, and UniCare. Healthlink says that it was also a victim. Anthem says users' medical information and financial data were not compromised. Anthem has offered free credit monitoring in the wake of the breach. Michael Daniel, chief adviser on cyberse ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Brian Krebs
Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 28, 2014. Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for ''The Washington Post'' and covered tech policy, privacy and computer security as well as authoring the ''Security Fix'' blog. Early life and education Born in 1972 in Alabama, Krebs earned a B.A. in International Relations from George Mason University in 1994. His interest in cybercriminals grew after a computer worm locked him out of his own computer in 2001. Chris Krebs is not related to Brian Krebs. Career 1999–2007 Krebs started his career at ''The Washington Post'' in the circulation department. From there, he obtained a job as a copy aide in the Post newsroom, where he split ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Security Orchestration, Automation, And Response
Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g., freedom from want); as the presence of an essential good (e.g., food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or cell); and as a state of mind (e.g., emotional security). Security is both a feeling and a state of reality. One might feel secure when one is not actually so; or might feel insecure despite being safe. This distinction is usually not very clear to express in the English language. The term is also used to refer to acts and sy ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
BostInno
BostInno is a local online news site and community publishing platform covering "the view from inside" innovation in Boston. It was founded in 2008 as a community startup blog by Chase Garbarino, CEO and co-founder of Streetwise Media, and Kevin McCarthy, CTO and co-founder. On December 7, 2009, BostInno was relaunched as a news platform profiling local innovation across verticals including tech, venture capital, city news, food, higher education, and sports. BostInno is operated by Streetwise Media, the online media company founded by Chase Garbarino, Kevin McCarthy, and Greg Gomer which seeks to reinvent the model of local news online. BostInno headquarters are in Faneuil Hall in Boston. History BostInno was created in 2008 in Boston, Massachusetts as a blog hosted on WordPress. It later had its time as a wiki and then a Twitter aggregator. BostInno re-launched on December 7, 2009, and became a news platform for the "hub of the universe", Boston, as a flagship property of ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cyber Risk Quantification
Cyber risk quantification involves the application of risk quantification techniques to an organization's cybersecurity risk. Cyber risk quantification is the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed cybersecurity infrastructure investment and risk transfer decisions. Cyber risk quantification is a supporting activity to cybersecurity risk management; cybersecurity risk management is a component of enterprise risk management and is especially important in organizations and enterprises that are highly dependent upon their information technology (IT) networks and systems for their business operations. One method of quantifying cyber risk is the value-at-risk (VaR) method that is discussed at the January 2015 World Economic Forum meeting. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |