Guest Blogs
Written by Derek Manky, Chief of Security Insights & Global Threat Alliances, Fortinet’s FortiGuard Labs With the 4th anniversary of the Cyber Threat Alliance (CTA) having just occurred, I got to thinking about how the CTA started. Not with the incorporation of the organization in 2017, but with the…
Guest Blogs
Written by Ryan Olson, VP Threat Intelligence (Unit 42), Palo Alto Networks When Palo Alto Networks and Fortinet co-founded the Cyber Threat Alliance (CTA) in 2014, which eventually incorporated on January 23, 2017, I would have never guessed years later there would be 30+ members. It’s a significant accomplishment…
CTA News
On January 23rd, CTA turned four. It seems like both a long time and a brief moment since our six founding members officially incorporated the organization as a non-profit. Since then, CTA members and staff have worked hard to turn the company into a viable long-term sharing organization. In that…
CTA News
Maybe it should be unsurprising that 2020 has no intention of going quietly. By the beginning of December, it had already given us a sudden explosion in remote work, COVID-19 themed lures, a ransomware surge, election disinformation, and 5G deployment battles. Yet, 2020 was not finished. As we head…
Major Incidents
On December 13, FireEye and Microsoft released information regarding a newly discovered nation-state campaign actors leveraging access to the SolarWinds Orion Platform. The SolarWinds Orion Platform is used for IT infrastructure management in many government agencies and corporate networks. Nation-state actors compromised the SolarWinds supply chain to trojanize…
Guest Blogs
Written by Scott Lambert, VP of Threat Research, ReversingLabs In 2018, Kirstjen Nielsen, then secretary of the Department of Homeland Security (DHS), spoke at the first-ever National Cyber Security Summit in New York City, where she gave a stark overview of the cyberthreats facing the United States. Her message…
CTA News
The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we explore in greater depth these various use cases and the common themes that…
Guest Blogs
Although nation-state activities in cyberspace often grab the headlines, the majority of malicious cyberactivity comes from cybercrime. CTA members spend a lot of time and money combating this problem. That’s one reason why we work with organizations like the Cybercrime Support Network to reduce the effects of cybercrime on…
CTA News
The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we will explore in greater depth these various use cases and the common…
CTA News
The Cyber Threat Alliance (CTA) recently published our Solutions Fact Sheet, which details for prospective members and other interested parties the many ways in which CTA membership generates mutual value. In this series of blog posts, we will explore in greater depth these various use cases and the common…