Blog_Header.jpg

IntSights' Blog

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

Over the past few years, we’ve seen a noticeable increase in cybercriminals using social media as part of their attack strategy. Whether it’s a phishing campaign, online impersonation or just simply trying to promote their goods or services, social media provides hackers with a large audience...

To continue our blog series on how to upgrade your threat intelligence program, we turn to part 3: leverage automation and integrations. The longer a threat goes unmitigated, the bigger risk it poses. That’s why automation is key to an effective threat intelligence program. Using integrations...

What good is threat intelligence if you can’t take action on it? At IntSights, our goal is to help organizations operationalize their threat intelligence, which is why we’re highly focused on integrating our platform with leading security and technology solutions. 

We’re excited to announce...

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and hackers are no exception. This why one of the most targeted sectors...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

The 2018 NFL season kicks off this week, meaning football fans and fantasy team owners are gearing up for what’s sure to be an exciting season. There are lots of expressions and sayings in football, like there’s no “i” in “Team” or clear eyes, full hearts, can’t lose. But there’s one saying that...

As long as banks have money, there will always be bank robberies. However, the shouts of “Nobody move, nobody gets hurt,” has been replaced by the dull clicks of hacker keystrokes halfway across the globe. Hackers treat banks as their personal ATMs. They slip in and out of hidden cyber tunnels...

The pharmaceutical industry is one of the most targeted industries on the web, especially in black market platforms. This comes as no surprise, as purchasing illegal substances has always been something that people are interested in, and where there is demand, there is a market. The price for...

In our recent Dark Side of Asia research report, we uncovered some of the key goods, services, threat actors and motivations behind the growing underground Asian Internet community. One of the largest forces of this community is China, whose Internet population has grown immensely over the past...

“If you know the enemy and know yourself, you need not fear the result of a hundred battles." This is quote from Sun Tzu's famous book, The Art of War. To defeat your enemy, you must know your enemy, and the same goes for the world of cyber security. The financial services industry is the...

As the threat landscape evolves, so too must a company’s threat intelligence program. Cyber attacks have become more targeted, complex and frequent, and as a result, threat intelligence teams have become overwhelmed with the amount of data and alerts that are associated with “intelligence”. To...