muninn.ai - kn
Posts about:
Malware Analysis
Cyber Trends 2024 is Out Now
Cyber Trends 2024 is Out Now
It's here - Muninn Cyber Trends 2024. Our ultimate guide to all hot topics within cybersecurity.
In this issue we shed a light on the...
IT vs. OT Cybersecurity: Understanding the Key Differences
IT vs. OT Cybersecurity: Understanding the Key Differences
Historically, information technology (IT) and operational technology (OT) environments were designed to operate independently, be managed by different teams with different objectives, and had no cross over between the two. However, this has changed dramatically over the past decades — mostly due to the acceleration of digital transformation. Organizations in all sectors have since become increasingly reliant on newer types of cyber-physical systems and other technologies that both require and continue to expand connectivity between IT and OT. As a result, these previously isolated environments are converging, giving rise to undeniable business benefits ranging from greater efficiency and sustainability to innovation. Unfortunately, this convergence is also fueling new risks and challenges — particularly when it comes to IT and OT cybersecurity.
When Too Much of a Good Thing is Bad: How to Tame the Cybersecurity Alert Monster
When Too Much of a Good Thing is Bad: How to Tame the Cybersecurity Alert Monster
The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting
The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting
A Threat Hunting Overview
Threat hunting: the art and science of tracking down hidden cyber threats lurking within your organization's network. These malicious footprints are left behind by hackers as they carry out illegal activities, whether it's on a compromised machine or via remote-controlled platforms. In some cases, it can be hard to detect them, and stealthy attackers are able to hide within networks for weeks, if not months. An astonishing 83% of organizations had more than one data breach in 2022 and approximately 47% of all cybersecurity incidents involved Personally Identifiable Information (PII) stolen by cybercriminals.
Uncovering your Blind Spots: How IoC Blacklists Works
Uncovering your Blind Spots: How IoC Blacklists Works
Deep Diving into Specific Notifications
Deep Diving into Specific Notifications