Blog_Header.jpg

IntSights' Blog

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

The Dark Web has received a lot of attention recently, and is often portrayed as a scary, mysterious place where cyber criminals steal identities and purchase illegal goods. While this is true, the Dark Web can actually be a great source of threat intelligence. Hackers and Advanced Persistent...

Browsing the Internet has become a minefield, where nearly any web page has the potential to infect a visitor’s endpoint (i.e., the user) and the endpoint's entire internal network (i.e., the organization). If users are not careful, they can trigger malicious malware downloads or get fooled by a...

As the cyber threat landscape continues to evolve, it's important to have tailored, actionable intelligence you can use to anticipate cyber attacks and data leakage. Organizations need to start looking beyond their perimeter to monitor their digital footprint and view their organization like an...

2017 was a historic year for cybersecurity. The estimated number of records stolen through 2017 doubled from 2016 (from 1.38 billion to 2.7 billion). In addition, the world was hit with unprecedented ransomware attacks, like WannaCry (which we just celebrated the 1 year anniversary of). This has...

An ad uploaded to a Russian underground black market a few days ago allegedly offers a new and improved version of the infamous banking malware Asacub. This Android malware was originally designed to steal user data and send it to a remote server, but in January 2016, cybersecurity company...

A recent New York Times article reports that a Ukrainian hacker nicknamed ‘Profexer’ reportedly turned himself in to the FBI for assisting the Russian-run campaign to sway the 2016 US elections, dubbed “Grizzly Steppe”.

The alleged campaign included hacking the DNC and leaking its data online,...

Last week’s HBO hack led to the release of sensitive information about HBO executives, contact lists, and -- most salacious for the media -- scripts and low-res copies of brand new “Game of Thrones” episodes. While the hacks have not led to any decrease in viewership for the epically popular...

Exploit Kits (EK’s) have been around for at least the past decade, and every time one gets taken down, it’s only a matter of time before a new, more sophisticated one pops up on the Dark Web. Now there’s a new kid on the block named “Disdain.”

IntSights Research Group (IRG) has uncovered an interesting new development: a black market for black markets. Developers are selling a black market framework, which allows ‘merchants’ to sell just about anything.

The internet is creating a new kind of criminal whose average age is just seventeen.  Most of this new criminal element are unlikely to be involved with theft, fraud, sex or harassment crimes.  The crime that these teenagers (mostly male) are committing is cyber-crime.

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

As cyber threats become more rampant, financial institutions are increasingly targeted by highly skilled and motivated criminals. While the new cyber security regulations set forth by The New York State Department of Financial Services (NYSDFS)--which went into effect March 1, 2017--aim to...