Blog_Header.jpg

IntSights' Blog

As the cyber threat landscape continues to evolve, it's important to have tailored, actionable intelligence you can use to anticipate cyber attacks and data leakage. Organizations need to start looking beyond their perimeter to monitor their digital footprint and view their organization like an...

An ad uploaded to a Russian underground black market a few days ago allegedly offers a new and improved version of the infamous banking malware Asacub. This Android malware was originally designed to steal user data and send it to a remote server, but in January 2016, cybersecurity company...

A recent New York Times article reports that a Ukrainian hacker nicknamed ‘Profexer’ reportedly turned himself in to the FBI for assisting the Russian-run campaign to sway the 2016 US elections, dubbed “Grizzly Steppe”.

The alleged campaign included hacking the DNC and leaking its data online,...

Last week’s HBO hack led to the release of sensitive information about HBO executives, contact lists, and -- most salacious for the media -- scripts and low-res copies of brand new “Game of Thrones” episodes. While the hacks have not led to any decrease in viewership for the epically popular...

Exploit Kits (EK’s) have been around for at least the past decade, and every time one gets taken down, it’s only a matter of time before a new, more sophisticated one pops up on the Dark Web. Now there’s a new kid on the block named “Disdain.”

IntSights Research Group (IRG) has uncovered an interesting new development: a black market for black markets. Developers are selling a black market framework, which allows ‘merchants’ to sell just about anything.

The internet is creating a new kind of criminal whose average age is just seventeen.  Most of this new criminal element are unlikely to be involved with theft, fraud, sex or harassment crimes.  The crime that these teenagers (mostly male) are committing is cyber-crime.

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

As cyber threats become more rampant, financial institutions are increasingly targeted by highly skilled and motivated criminals. While the new cyber security regulations set forth by The New York State Department of Financial Services (NYSDFS)--which went into effect March 1, 2017--aim to...

Talented Cybersecurity Intelligence Analysts are hard to find. As we noted in our “Perfect Analyst” blog post, a good analyst must possess a myriad of qualities and have years of experience to be able to cope with massive amounts of data and act effectively.

Passwords are the cornerstone of modern information security. It’s inconceivable to think of information security without passwords, yet they are an extremely vulnerable security mechanism. Every time a new “mega breach” occurs, the details of millions of users are exposed and sold online. These...

Threat Intelligence is built on three pillars, which, when integrated, allow identification and remediation of security threats.  

Europol’s European Cybercrime Centre (EC3) recently published the “2016 Internet Organised Crime Threat Assessment (IOCTA)”. https://www.europol.europa.eu/iocta/2016/threat-areas.html