Blog_Header.jpg

IntSights' Blog

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and threat actors are no exception. This growth in online shopping,...

We've reached the final strategy in our series, 6 Ways to Upgrade your Threat Intelligence Program. This final strategy focuses on your digital attack surface, which extends to any vendor or partner that you share data with. If they get breached, there’s a chance your data can be exposed, so it...

It's another week, which means another tip for upgrading your threat intelligence program: Take Down Fraud Campaigns & Cyber Scams. Cyber fraud is a booming business for hackers, generating millions of dollars worth of fraudulent purchases each year. Even if a company is not responsible for...

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

To continue our blog series on how to upgrade your threat intelligence program, we turn to part 3: leverage automation and integrations. The longer a threat goes unmitigated, the bigger risk it poses. That’s why automation is key to an effective threat intelligence program. Using integrations...

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and hackers are no exception. This why one of the most targeted sectors...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

The 2018 NFL season kicks off this week, meaning football fans and fantasy team owners are gearing up for what’s sure to be an exciting season. There are lots of expressions and sayings in football, like there’s no “i” in “Team” or clear eyes, full hearts, can’t lose. But there’s one saying that...

As the cyber threat landscape continues to evolve, it's important to have tailored, actionable intelligence you can use to anticipate cyber attacks and data leakage. Organizations need to start looking beyond their perimeter to monitor their digital footprint and view their organization like an...

An ad uploaded to a Russian underground black market a few days ago allegedly offers a new and improved version of the infamous banking malware Asacub. This Android malware was originally designed to steal user data and send it to a remote server, but in January 2016, cybersecurity company...

A recent New York Times article reports that a Ukrainian hacker nicknamed ‘Profexer’ reportedly turned himself in to the FBI for assisting the Russian-run campaign to sway the 2016 US elections, dubbed “Grizzly Steppe”.

The alleged campaign included hacking the DNC and leaking its data online,...

Last week’s HBO hack led to the release of sensitive information about HBO executives, contact lists, and -- most salacious for the media -- scripts and low-res copies of brand new “Game of Thrones” episodes. While the hacks have not led to any decrease in viewership for the epically popular...