Blog_Header.jpg

IntSights' Blog

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

A few weeks ago, I posted a blog about "Digital Footprints" and how cybercriminals use them in their attacks. This is a key challenge for almost every organization, yet most don’t have any tools in place to monitor and track their digital footprint, which means their attack surface is growing...

Earlier this week, Forrester released their State of the Threat Intelligence Platform Market, Q3 2018 Report. In this report, they provided an overview of the market for Threat Intelligence Platforms, and listed 10 companies they felt were the most important vendors in this industry. IntSights...

At the end of May 2018 (only a few months ago), there was a major site takedown that shook the dark web world. This site was Atlenen.com, a major carding site where hackers bought and sold fraud tactics. The site was taken down after Israeli authorities arrested the site’s manager, a Palestinian...

It comes as no surprise, but the financial services and banking industry is the most-targeted industry by cybercriminals. The amount of user and account data available across the Dark Web has allowed cybercriminals to run large-scale fraud attacks and more successful phishing campaigns across a...

A lot has been said about the term “Digital Footprint”. The term relates to all of the digital bread crumbs left by an individual or a company across the public web. Have you ever uploaded a resume to a site? Posted your birthday photos to Facebook? Published an article? Built a new website? ...

On July 17, Forrester released their New Wave: Digital Risk Protection, Q3 2018 Report. The report features Forrester’s evaluation of the emerging Digital Risk Protection (DRP) market, and shares results of how 14 DRP vendors scored against their evaluation criteria. IntSights is proud to be...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...

There’s no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we’ve seen a continued increase in attacks that directly target financial organizations, which comes as no surprise. However, increased access to...

A new type of threat that has been on the rise over the past few years is the use of fake social media profiles for cyber scams. These profiles usually try to impersonate someone or something a user usually trusts, such as big name brands and companies. Fake profiles can be used in a variety of...

When it comes to dark web black markets, anonymity is key. To help maintain their anonymity, dark web black market users leverage a variety of tools and technologies that mask their identity and location. It’s important to know how these tools are used so you can perform reconnaissance and...

On May 28, 2018, news reports started to surface about a data breach affecting two CIBC (Canadian Imperial Bank of Commerce) subsidiaries – BMO (Bank of Montreal) and Simplii Financial. The reports stated that a data breach had occurred and that 90,000 customer records had been leaked. Hackers...

Over the past year and half, we've seen a number of significant shifts to the threat landscape, particularly for financial services organizations. These changes will be outlined in our Financial Services Threat Landscape Report (July 2018), which will be published in the coming weeks. As the...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...