Today, cyber threat intelligence company ThreatConnect released the industry’s first threat intelligence (TI) platform explicitly designed for TI Ops. The new release radically increases the effectiveness of threat intelligence analysts and security operations teams by bringing together the power of human analysis, ML-powered analytics and intelligence, and automation.
The ThreatConnect Platform enables organizations to achieve alignment between security operations and the critical risks to the business, better security efficiencies, and greater effectiveness, including faster time to mitigate essential vulnerabilities and faster mean time to detect (MTTD) and respond (MTTR) to threats. In a recent survey of ThreatConnect customers, more than 68% of respondents said that the product helped them improve their MTTR by more than 50%.
In the same study, 95% of respondents noted that ThreatConnect enabled them to get more value from their existing security tools, such as SIEM, XDR, and SOAR. Customers can now go beyond just managing threat intel to operationalizing it and fusing it across every part of your security program, from threat investigation to incident response to vulnerability management with ThreatConnect’s ML-Powered Global Intelligence and Analytics with CAL™ v3.0, Native Reporting Engine, and Built-in Enrichment.
For more information, there’s a blog post that you can read a this link: ThreatConnect 7.0: The Industry’s First Threat Intelligence Operations (TI Ops) Platform.




Riot Games Pwned And The Company Gives The Hackers Behind It A Big Middle Finger
Posted in Commentary with tags Hacked on January 25, 2023 by itnerdI report on companies getting pwned by hackers. But I rarely get to report on companies that have been pwned flipping the bird metaphorically speaking to said hackers. Take Riot Games. They were hacked last week.
Yesterday, the company updated this situation with a very interesting response:
So the company had source code stolen. But they aren’t going to pay the hackers who were apparently were asking for $10 million.
While in the short term, I can see a scenario where cheats for various Riot Games appear, this is the right decision because stolen data is only valuable if the hackers get paid. So how valuable is the data that was stolen I ask? And also, Riot has been very transparent. More so than I am used to seeing.
David Maynor, Senior Director of Threat Intelligence, Cybrary had this to say:
“This is one of the better way to handle an ransomware event. They laid everything out include potential downsides but ends on a cherry note that most of the stolen code was prototype and was never designed to be released. This is transparency personified.”
Michael Slipsager, CEO, BullWall follows up with this commentary:
“Riot Games will not be paying the $10 million ransom demand to stop the leak of their source code. Good for them and for practicing full transparency on the breach, as paying the ransom not only emboldens hackers to continue their attacks, but it also does not guarantee that the stolen data will not be released.
“Despite taking steps to protect their data, even companies with strong security measures in place can still fall victim to a ransom attack and can still suffer the consequences of a ransom attack, such as loss of sensitive data, reputational damage, and financial losses.
“Even well-prepared companies like Riot Games may find themselves vulnerable to a ransom attack and it is important for all companies to stay vigilant and have a robust incident response plan in place to minimize the impact of such attacks.”
I applaud Riot Games for taking this stance. If more companies would do something like this as opposed to paying the ransom, hackers would be out of business shortly thereafter.
Leave a comment »