Blog_Header.jpg

IntSights' Blog

2019 will be a big year for IntSights, and I’m excited to kick off the new year with an important announcement. IntSights has hired Nick Hayes, formerly Senior Analyst at Forrester Research, as our Vice President of Strategy! Nick will be instrumental in helping IntSights continue building a...

We’ve all heard about the Marriot data breach, which was publicly announced on November 30, 2018. You can now throw Marriott in with the likes of Yahoo and Equifax, all prominent companies who suffered massive data breaches. However, like most breaches, the source of Marriott’s breach goes back...

Last week, German media, including newspaper Bild and broadcasting company RBB, reported on a breach in German Parliament, which resulted in the exposure of thousands of private and confidential files to the general public. Here is our summary of the breach, including details about the attacker...

Our Top Blog Posts of 2018

by Nathan Teplow / December 27, 2018

2018 has been a busy year for the IntSights blog! Between notable breaches, intelligence best practices, new research reports and important dark web discoveries, there's been a lot to cover this past year. In fact, we've published over 70 new posts this year from 12 different authors. In...

Almost every organization has a “cloud” or “digital transformation” initiative, which typically involves moving company systems and data to the cloud to increase accessibility and collaboration. Yet, as more and more data is moved online, backdoors are often unknowingly left open, which can...

This is why you shouldn’t share your password with anyone.

You know how important your brand is. It’s an identity, a reputation, an expectation, and a promise to customers. You know the importance of protecting that brand, but can you spot others trying to impersonate your CEO on Twitter or identify fake apps that mimic your company and/or brands to...

Over the past few years, the healthcare sector has been a victim to numerous breaches. More than 113 million medical records were hacked in 2015 alone, according to data compiled by The U.S. Department of Health and Human Services (HHS). In 2016, the industry averaged more than one data breach...

There’s a lot of talk these days about Cyber Threat Intelligence (CTI) because it gives organizations an opportunity to be proactive, rather than reactive, in their cyber defense. There are many interesting use cases for CTI, but it takes an investment in tools and people to be used effectively....

Cyber Monday is less than a week away. For this year’s holiday season, analysts expect total sales to surpass $720 billion. That’s a lot of money changing hands, and as we’ve seen in previous years, any time there is a high volume of transactions and activity, cybercriminals will flock to get a...

Since the days of the Wild West, banks and financial institutions have come to realize that their main threats originate from crime groups. Today, even as crime has moved into cyberspace, most financial institutions still believe these crime groups are their primary adversaries, as well as...

Now that Halloween is over, we can officially begin the holiday season! That means retailers are gearing up with new ad campaigns, seasonal hiring and special holiday deals. It also means that cybercriminals are gearing up with new strategies and tactics for how to scam retailers and unknowing...

Tomorrow marks Halloween here in the U.S, where children (and adults too) dress up in costumes and go door-to-door collecting candy around their neighborhood. While many people will be disguising themselves tomorrow night, there’s a place online where people disguise themselves every day...the...

Just like other industries have adopted the "as-a-Service" model, hackers are doing the same by selling easy access to tools, instructions, target lists, and hackers for hire, creating an online platform for cybercriminals. The concept of Hacking-as-a-Service has created a 'pay to play'...