Blog_Header.jpg

IntSights' Blog

Financial cyber fraud is on the rise around the world. Earlier this year, IntSights recorded a 212 percent year-over-year increase in credit card data posted on dark web forums and black markets. This significant uptick in exposed credit cards causes headaches for consumers and the financial...

The hospitality industry – including hotels, resorts, casinos, and other travel and leisure businesses – is increasingly under siege by cybercriminals looking to penetrate their corporate networks and steal valuable customer data. Threat actors prey on these organizations’ widely dispersed...

Phishing is the oldest trick in the cybercriminal playbook, dating back to the early days of the internet. But it remains effective, even in today’s more digitally-savvy world, and despite organizations investing heavily in staunch security solutions.

IntSights has partnered with Zscaler to offer customers a solution that combines tailored threat intelligence from the clear, deep, and dark web with next-generation cloud security. IntSights provides external visibility of an organization’s security posture while Zscaler delivers an internal...

Implementing an effective digital risk protection (DRP) strategy is crucial for cybersecurity teams to proactively thwart potential cyberattacks against their organizations. But there is no such thing as one-size-fits-all when it comes to DRP. Because each organization has a unique digital...

Threat actors have increasingly targeted the hospitality industry in recent years, as organizations in this sector have expansive databases of customers’ personally identifiable information (PII) and numerous access points like software systems, third-party vendors, and high staff turnover...

The dark web is more vast and more dynamic than ever before. Full underground forums and criminal marketplaces spin up and spin down at the snap of the finger, while hacker groups take increasing precautions to vet new and existing members. While the existence of the dark web is no secret, fewer...

It’s no secret that banks and financial services organizations face an onslaught of cyber threats. Cybercriminals are constantly finding new ways to infiltrate corporate defense networks and gain access to financial assets, customer information, sensitive records, and corporate credentials....

Business throughout the Asia-Pacific (APAC) region are suffering from financially devastating data breaches. While APAC leads the world in terms of connected cities – or “smart” cities – there is a widening cybersecurity gap that threatens organizations operating there. At the same time,...

IntSights and our friends over at Riskified teamed up to trace a fraud victim's actual credit card from when it was first stolen in 2014 to when the first rejected orders using that compromised card appeared in the Riskified system. All names and other sensitive information have been anonymized...

Organizations have a tricky balance to strike when it comes to cyber threat intelligence. Many teams are overwhelmed with data, making it difficult to parse out real threats from benign activity. However, extensive data collection is crucial to ensure you can effectively identify threats early...

Your company’s brand is one of its greatest assets. That’s why cybercriminals and scammers are increasingly targeting well-known corporate brands, running cybercrime campaigns and exploiting unaware consumers. By masquerading as familiar brands in popular channels – social media, mobile apps,...

Twenty years ago, every CISO would have been happy to simply have a full list of possible indicators of compromise (IOC) facing their organization. These lists were fairly simple at the time, so each organization’s security experts could memorize them and make sure they had a dedicated solution...

Digital risk protection (DRP) is a burgeoning trend in cybersecurity as organizations look to bolster their defense systems amidst seemingly endless sources of cyberattacks. We’ve talked at length about the preliminary steps of implementing DRP as part of an effective cybersecurity strategy:...