Blog_Header.jpg

IntSights' Blog

You know how important your brand is. It’s an identity, a reputation, an expectation, and a promise to customers. You know the importance of protecting that brand, but can you spot others trying to impersonate your CEO on Twitter or identify fake apps that mimic your company and/or brands to...

Over the past few years, the healthcare sector has been a victim to numerous breaches. More than 113 million medical records were hacked in 2015 alone, according to data compiled by The U.S. Department of Health and Human Services (HHS). In 2016, the industry averaged more than one data breach...

There’s a lot of talk these days about Cyber Threat Intelligence (CTI) because it gives organizations an opportunity to be proactive, rather than reactive, in their cyber defense. There are many interesting use cases for CTI, but it takes an investment in tools and people to be used effectively....

Cyber Monday is less than a week away. For this year’s holiday season, analysts expect total sales to surpass $720 billion. That’s a lot of money changing hands, and as we’ve seen in previous years, any time there is a high volume of transactions and activity, cybercriminals will flock to get a...

Since the days of the Wild West, banks and financial institutions have come to realize that their main threats originate from crime groups. Today, even as crime has moved into cyberspace, most financial institutions still believe these crime groups are their primary adversaries, as well as...

Now that Halloween is over, we can officially begin the holiday season! That means retailers are gearing up with new ad campaigns, seasonal hiring and special holiday deals. It also means that cybercriminals are gearing up with new strategies and tactics for how to scam retailers and unknowing...

Tomorrow marks Halloween here in the U.S, where children (and adults too) dress up in costumes and go door-to-door collecting candy around their neighborhood. While many people will be disguising themselves tomorrow night, there’s a place online where people disguise themselves every day...the...

Just like other industries have adopted the "as-a-Service" model, hackers are doing the same by selling easy access to tools, instructions, target lists, and hackers for hire, creating an online platform for cybercriminals. The concept of Hacking-as-a-Service has created a 'pay to play'...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and threat actors are no exception. This growth in online shopping,...

We've reached the final strategy in our series, 6 Ways to Upgrade your Threat Intelligence Program. This final strategy focuses on your digital attack surface, which extends to any vendor or partner that you share data with. If they get breached, there’s a chance your data can be exposed, so it...

FASTCash is an ATM cash-out method utilized by the North Korean APT, Hidden Cobra. This method revolves around compromising payment switch servers and facilitating malicious transactions. Threat actors target the retail payment system infrastructure within banks that intercepts fraudulent ATM...

It's another week, which means another tip for upgrading your threat intelligence program: Take Down Fraud Campaigns & Cyber Scams. Cyber fraud is a booming business for hackers, generating millions of dollars worth of fraudulent purchases each year. Even if a company is not responsible for...

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

Over the past few years, we’ve seen a noticeable increase in cybercriminals using social media as part of their attack strategy. Whether it’s a phishing campaign, online impersonation or just simply trying to promote their goods or services, social media provides hackers with a large audience...