Blog_Header.jpg

IntSights' Blog

We've reached the final strategy in our series, 6 Ways to Upgrade your Threat Intelligence Program. This final strategy focuses on your digital attack surface, which extends to any vendor or partner that you share data with. If they get breached, there’s a chance your data can be exposed, so it...

It's another week, which means another tip for upgrading your threat intelligence program: Take Down Fraud Campaigns & Cyber Scams. Cyber fraud is a booming business for hackers, generating millions of dollars worth of fraudulent purchases each year. Even if a company is not responsible for...

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

To continue our blog series on how to upgrade your threat intelligence program, we turn to part 3: leverage automation and integrations. The longer a threat goes unmitigated, the bigger risk it poses. That’s why automation is key to an effective threat intelligence program. Using integrations...

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

The 2018 NFL season kicks off this week, meaning football fans and fantasy team owners are gearing up for what’s sure to be an exciting season. There are lots of expressions and sayings in football, like there’s no “i” in “Team” or clear eyes, full hearts, can’t lose. But there’s one saying that...

As long as banks have money, there will always be bank robberies. However, the shouts of “Nobody move, nobody gets hurt,” has been replaced by the dull clicks of hacker keystrokes halfway across the globe. Hackers treat banks as their personal ATMs. They slip in and out of hidden cyber tunnels...

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

A few weeks ago, I posted a blog about "Digital Footprints" and how cybercriminals use them in their attacks. This is a key challenge for almost every organization, yet most don’t have any tools in place to monitor and track their digital footprint, which means their attack surface is growing...

Earlier this week, Forrester released their State of the Threat Intelligence Platform Market, Q3 2018 Report. In this report, they provided an overview of the market for Threat Intelligence Platforms, and listed 10 companies they felt were the most important vendors in this industry. IntSights...

It comes as no surprise, but the financial services and banking industry is the most-targeted industry by cybercriminals. The amount of user and account data available across the Dark Web has allowed cybercriminals to run large-scale fraud attacks and more successful phishing campaigns across a...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...