Blog_Header.jpg

IntSights' Blog

Noga

Recent Posts

What happened?

On September 9, Equifax, a major credit bureau that provides credit reports in the US, announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. According to the company’s statement, the breach lasted more than a month -- from mid-May until...

An ad uploaded to a Russian underground black market a few days ago allegedly offers a new and improved version of the infamous banking malware Asacub. This Android malware was originally designed to steal user data and send it to a remote server, but in January 2016, cybersecurity company...

A recent New York Times article reports that a Ukrainian hacker nicknamed ‘Profexer’ reportedly turned himself in to the FBI for assisting the Russian-run campaign to sway the 2016 US elections, dubbed “Grizzly Steppe”.

The alleged campaign included hacking the DNC and leaking its data online,...

Last week’s HBO hack led to the release of sensitive information about HBO executives, contact lists, and -- most salacious for the media -- scripts and low-res copies of brand new “Game of Thrones” episodes. While the hacks have not led to any decrease in viewership for the epically popular...

Exploit Kits (EK’s) have been around for at least the past decade, and every time one gets taken down, it’s only a matter of time before a new, more sophisticated one pops up on the Dark Web. Now there’s a new kid on the block named “Disdain.”

IntSights Research Group (IRG) has uncovered an interesting new development: a black market for black markets. Developers are selling a black market framework, which allows ‘merchants’ to sell just about anything.

The internet is creating a new kind of criminal whose average age is just seventeen.  Most of this new criminal element are unlikely to be involved with theft, fraud, sex or harassment crimes.  The crime that these teenagers (mostly male) are committing is cyber-crime.

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

As cyber threats become more rampant, financial institutions are increasingly targeted by highly skilled and motivated criminals. While the new cyber security regulations set forth by The New York State Department of Financial Services (NYSDFS)--which went into effect March 1, 2017--aim to...

03/01/2017, SAN FRANCISCO, CA—

Momentum Partners, advisors and dealmakers in cybersecurity, has announced the final 10 companies added to the firm’s annual Watch List. Each quarter 10 companies are selected after carefully weighing feedback from the field and considering a variety of growth and...

Talented Cybersecurity Intelligence Analysts are hard to find. As we noted in our “Perfect Analyst” blog post, a good analyst must possess a myriad of qualities and have years of experience to be able to cope with massive amounts of data and act effectively.

HERZLIYA, Israel, February 13, 2017 /PRNewswire/ --

IntSights, a Herzliya, Israel-based company with sales and marketing headquartered in the US, and a leading intelligence-driven security provider for cyber threats from the dark, deep and open web, announced today the completion of a $15M...

Threat information sharing requires dedicated protocols in order to accurately and quickly disseminate the information. The industry recognised this, and has developed three formats, each with a specific function: