skip to Main Content

Associated Risks: A Perhaps Not-So-Obvious Threat

Associated risks are potential unwanted outcomes resulting from an incident, event, or occurrence in nearby proximity, that may not be connected to the specific organization or location. In many instances, the associated risk stems from the impact of threats against people, places or event that are actually the intended target
Read more

Hostile Events Attack Cycle – Intense Surveillance

Once a target is selected, the attacker will resolve outstanding questions about the target environment, expand collection efforts through surveillance, and seek to adequately address remaining unknowns in order to ensure their attack is as successful as possible.
Read more

Hostile Events Attack Cycle – Target Selection

In this and future posts, we will explore the HEAC in greater detail, focusing on steps in the cycle, how the attacker conducts each step, and how organizations can prepare to defend against potential attacks. In this post we cover how attackers use initial planning to select targets.
Read more

Say No to Ransomware – Have a Plan!

Over the past several weeks, ransomware has been a widespread topic. However, on 02 July there was a bit of good news for a change. St John Ambulance, a “not-for-profit provider of specialist patient transport services across England” advised customers they were “subjected to a ransomware attack.” Fortunately, having a plan in place allowed St John Ambulance to resolve the issue within 30 minutes without paying any ransom demands.
Read more

FB-ISAO Newsletter, v1, issue 2

The second TLP White | FB-ISAO Newsletter was distributed on 02 July, and may be accessed below. FB-newsletter-July-2019Download To access links, download the FB-ISAO Newsletter from the link above.

Read more
Back To Top
Show Buttons
Hide Buttons