Threat Intelligence
Detection rules that identify malware infections
Nokia Threat Intelligence focuses on the behavior of malware network communications. It develops detection rules that identify malware infections based on command-and-control communication and other network behavior. This approach enables fast detection of malware in Communication Service Providers' (CSP) networks.
The detection rules developed by the Threat Intelligence Center form the foundation of Nokia NetGuard Endpoint Security (NES) solution.
Security notes and research papers published by Nokia Threat Intelligence
With the “stay home” mandate around the world to prevent the spread of the Coronavirus, online collaboration tools and apps use has increased dramatically. However, the popularity of some of these apps tends to fall in line with their availability and ease-of-use with security and privacy only being an afterthought.
As the COVID-19 virus spreads around the world, it’s little surprise that cybercriminals are exploiting people’s fears in attempts to steal data, gain personal information or deploy ransomware.
Nokia's Threat Intelligence became aware of a new browser-based Monero crypto-currency miner, originally identified by its authors as RiceWithChicken, which was being served up by otherwise benign websites.
Related solutions and products
Solution
XDR Security
Cloud-native Extended Detection and Response platform
Product
NetGuard Cybersecurity Dome
5G cybersecurity orchestration and threat incident response solution to detect, analyze, and mitigate telco security risks faster
Product
NetGuard Endpoint Detection and Response
Designed for mission critical infrastructures
Learn more about network security

Blog
Exponential potential: enabling networks that sense, think, and act

eBook
Real-time security data monitoring and reporting with Nokia NetGuard Endpoint Detection and Response

Blog
The compromised insider attack challenge – how to detect and respond before they cause harm

Brochure
Advanced Security Testing and Research (ASTaR) Lab
Presentation
Safeguarding security of 5G networks with the ASTaR lab

Blog
Three keys to stopping emerging 5G cyber threats

Application note
Automated security operations for railways
Video