Blog_Header.jpg

IntSights' Blog

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

A few weeks ago, I posted a blog about "Digital Footprints" and how cybercriminals use them in their attacks. This is a key challenge for almost every organization, yet most don’t have any tools in place to monitor and track their digital footprint, which means their attack surface is growing...

Earlier this week, Forrester released their State of the Threat Intelligence Platform Market, Q3 2018 Report. In this report, they provided an overview of the market for Threat Intelligence Platforms, and listed 10 companies they felt were the most important vendors in this industry. IntSights...

It comes as no surprise, but the financial services and banking industry is the most-targeted industry by cybercriminals. The amount of user and account data available across the Dark Web has allowed cybercriminals to run large-scale fraud attacks and more successful phishing campaigns across a...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...

Over the past year and half, we've seen a number of significant shifts to the threat landscape, particularly for financial services organizations. These changes will be outlined in our Financial Services Threat Landscape Report (July 2018), which will be published in the coming weeks. As the...

As the cyber threat landscape continues to evolve, it's important to have tailored, actionable intelligence you can use to anticipate cyber attacks and data leakage. Organizations need to start looking beyond their perimeter to monitor their digital footprint and view their organization like an...

With the cybersecurity threat landscape growing and evolving rapidly, many enterprises and other large organizations are seeking more effective ways to protect themselves and their employees from these threats. Threat intelligence platforms can help you take a more proactive approach to managing...

As cyber attacks continue to grow in size, scope and complexity, organizations across the world are forced to find new ways to protect themselves and mitigate these cyber threats. This has given rise to many Cyber Threat Intelligence (CTI) solutions and services, which all serve the purpose of...

Threat information sharing requires dedicated protocols in order to accurately and quickly disseminate the information. The industry recognised this, and has developed three formats, each with a specific function:

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

The EU General Data Protection Regulation (GDPR) will be in full effect by 2018 (see the full document here). The GPDR will replace the Data Protection Directive, that dates back to 1995. The regulation focuses on the processing and storing of personal data, and mandates organisations to act...

It seems that cyber-espionage is on everyone’s mind these days. Fierce allegations are being made by US officials, claiming that Russian hackers interfered with the US election process. President Obama’s last act in office was to issue sanctions against alleged Russian hacking. But is this...

We are proud to announce the release of a collaborative research project that we’ve conducted with the cybersecurity company Imperva.