Blog_Header.jpg

IntSights' Blog

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

Cybercriminals might have found the perfect way to scam people online with little risk and a chance for high gains- all by using legitimate crowdfunding sites. As we noted many times, Cybercriminals are always seeking to invent new, lucrative business models, preferably ones which require very...

While there are many cyber threat intelligence services available, both human and machine based, they tend to be flawed. Due to a reoccurring lack of context, the data is rendered less relevant, thus leaving the customers with limited actionable intelligence.

Ransowmare has been identified by the security community as a top threat of the cyber ecosystem in 2016. The proliferation of ransomware attacks in 2015 and 2016 resulted in a rapid evolution of new Ransomware types, yielding higher returns and fueling this epidemic.

You can find them on all social media platforms: LinkedIn, Facebook, even Twitter and Instagram. Corporate social media accounts which, for one reason or another, don’t look quite right. Many of these suspicious-looking “Official” social media accounts claiming to represent companies or...

The laws of economy state that if there’s a need for a product or service, there will be someone willing to offer it. If, however, one is in the market for something slightly bizarre or corrupt they need look no further than the Darknet marketplaces. Not surprisingly, the various goods and...

Managed security services (MSSP) are becoming more popular with enterprises who rely on them for managing their security apparatus. In the near future we expect to see MSSPs add Threat intelligence collection and assimilation as a key service offered to their existing clientele.