Domain Hijacking: The Definitive Guide to Detection & Remediation
Today, your company website is a critical part of your business. From marketing to sales, you use your website to support your business objectives. In many cases, companies incorporate portals that deliver digital customer experiences, including online purchasing and communications. As a customer-facing reflection of your corporate brand, you focus on how it looks, how […]
Combo Lists & the Dark Web: Understanding Leaked Credentials
In today’s interconnected, cloud-based world, user credentials are the keys that grant entry to the house that stores an organization’s digital treasure. Just as burglars pick the lock on a physical house, cybercriminals use stolen credentials to gain unauthorized access to a company’s systems and networks. Similarly, cybercriminals can purchase high volumes of stolen credentials […]
Business Email Compromise: 3 Steps to Reduce Risk
Email has been a popular delivery of malware and risk for decades. Since the first phishing schemes 1990s, phishing techniques have only become more sophisticated in the decades since. It’s particularly popular among criminals now; since 2019, the use of phishing scams has increased by 300%. The reason for the increase? Despite the proliferation of […]
Threat Actor TTPs & Cyber Threat Intelligence
Intelligence-driven cybersecurity is proactive. And proactive cybersecurity drives better defenses by improving the ability to anticipate threats, increase situational awareness, and reduce attack surfaces. Today’s cyber threat landscape sees more complex and diverse threats than ever. Delving into the tactics, techniques, and procedures (TTPs) that adversaries use is a valuable source of cyber threat intelligence […]
Geopolitical Intelligence: The Definitive Guide
Geopolitics and cybersecurity for organizations of all kinds are increasingly linked. This has become increasingly clear in the past year with Russia’s invasion of Ukraine, which has been called the world’s first hybrid war — attacks have taken place both on the ground and online. As Russia’s threat actors target Ukraine and its allies, nation-states […]
Threat Actors: The Definitive 2023 Guide to Cybercriminals
In a digital world, companies collect more data and more types of data than ever before. As people use more technology, they generate new types of sensitive data. While data protection laws and compliance frameworks often detail categories of information requiring enhanced protection, they fail to keep pace with technological advances. When people understand the […]
Threat Analysis: A Quick Guide
Every day, security teams go head-to-head with threat actors. As data breaches become more sophisticated, security analysts become increasingly overwhelmed. Between new vulnerabilities, malware variants, and attack methodologies, threat intelligence is more important than ever. However, depending on your organization’s unique security and IT stacks, not every new threat may be something malicious actors can […]
What is Advanced Threat Protection (ATP)?: The Definitive Guide
In today’s constantly evolving threat landscape, traditional security measures no longer suffice for protecting against sophisticated cyber threats. That’s where Advanced Threat Protection (ATP) comes in— a comprehensive security solution that goes beyond basic defenses to detect and respond to even the most advanced and elusive threats. If you’re rolling your eyes at another addition […]
Top Russian Cybercrime Forums in 2023
Cybercrime forums provide an outlet for threat actors to coordinate, exchange information, and conduct illicit trades. Often hosted on the dark web (but sometimes accessible via the clear web), these forums are hubs of malicious activity. The typical structure of a cybercrime forum sees a dedicated marketplace section that facilitates the sale of stolen credentials, […]
Tactical Threat Intelligence: Cybercriminals, TTPs, and More
Cyber threat intelligence plays a critical role in a proactive cybersecurity strategy. By gathering and analyzing data, security teams and company leaders are able to make quick and effective decisions about cyber security strategies and attacks. Not all cyber threat intelligence is the same however. Certain data is better suited for different uses. Some information […]