Blog_Header.jpg

IntSights' Blog

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and hackers are no exception. This why one of the most targeted sectors...

Threat information sharing requires dedicated protocols in order to accurately and quickly disseminate the information. The industry recognised this, and has developed three formats, each with a specific function:

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

The EU General Data Protection Regulation (GDPR) will be in full effect by 2018 (see the full document here). The GPDR will replace the Data Protection Directive, that dates back to 1995. The regulation focuses on the processing and storing of personal data, and mandates organisations to act...

It seems that cyber-espionage is on everyone’s mind these days. Fierce allegations are being made by US officials, claiming that Russian hackers interfered with the US election process. President Obama’s last act in office was to issue sanctions against alleged Russian hacking. But is this...

We are proud to announce the release of a collaborative research project that we’ve conducted with the cybersecurity company Imperva.

Passwords are the cornerstone of modern information security. It’s inconceivable to think of information security without passwords, yet they are an extremely vulnerable security mechanism. Every time a new “mega breach” occurs, the details of millions of users are exposed and sold online. These...

Threat Intelligence is built on three pillars, which, when integrated, allow identification and remediation of security threats.  

McAfee Labs annual Threats Report released recently focuses on Information Theft and advises organisations to employ both internal mechanism (such as DLP) and external sources (such as cyber intelligence services) to increase the chance of identifying data leaks.

Herzliya, Israel - Aug. 30, 2016 - IntSights, a leading intelligence driven security provider for cyber threats from the dark, deep and open web, today announced the completion of a $7.5M Series A funding round. The round was led by Blumberg Capital and included seed investor Glilot Capital...

The laws of economy state that if there’s a need for a product or service, there will be someone willing to offer it. If, however, one is in the market for something slightly bizarre or corrupt they need look no further than the Darknet marketplaces. Not surprisingly, the various goods and...

Managed security services (MSSP) are becoming more popular with enterprises who rely on them for managing their security apparatus. In the near future we expect to see MSSPs add Threat intelligence collection and assimilation as a key service offered to their existing clientele.