Blog_Header.jpg

IntSights' Blog

Since the days of the Wild West, banks and financial institutions have come to realize that their main threats originate from crime groups. Today, even as crime has moved into cyberspace, most financial institutions still believe these crime groups are their primary adversaries, as well as...

In our recent Dark Side of Asia research report, we uncovered some of the key goods, services, threat actors and motivations behind the growing underground Asian Internet community. One of the largest forces of this community is China, whose Internet population has grown immensely over the past...

“If you know the enemy and know yourself, you need not fear the result of a hundred battles." This is quote from Sun Tzu's famous book, The Art of War. To defeat your enemy, you must know your enemy, and the same goes for the world of cyber security. The financial services industry is the...

On May 28, 2018, news reports started to surface about a data breach affecting two CIBC (Canadian Imperial Bank of Commerce) subsidiaries – BMO (Bank of Montreal) and Simplii Financial. The reports stated that a data breach had occurred and that 90,000 customer records had been leaked. Hackers...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

The Dark Web has received a lot of attention recently, and is often portrayed as a scary, mysterious place where cyber criminals steal identities and purchase illegal goods. While this is true, the Dark Web can actually be a great source of threat intelligence. Hackers and Advanced Persistent...

OilRig is an Iranian-linked Advanced Persistent Threat (APT) group, which also goes by the names of Cobalt Gypsy, Twisted Kitten and Crambus. The group was identified in 2015 and is believed to be linked to the Iranian Intelligence agency and the Islamic Revolutionary Guard Corps (IRGC). At...

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

Europol’s European Cybercrime Centre (EC3) recently published the “2016 Internet Organised Crime Threat Assessment (IOCTA)”. https://www.europol.europa.eu/iocta/2016/threat-areas.html

No need to access the darknet- Cybercriminals now offer stolen credit card details directly on LinkedIn.

We are proud to announce the release of a collaborative research project that we’ve conducted with the cybersecurity industry leader- Checkpoint.

Cybercriminals might have found the perfect way to scam people online with little risk and a chance for high gains- all by using legitimate crowdfunding sites. As we noted many times, Cybercriminals are always seeking to invent new, lucrative business models, preferably ones which require very...

Hackers affiliated with Anonymous plan to attack financial institutions during the Brexit vote on 23/6.