Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Preventing Account Takeover Attacks: Ways to Reduce Risk

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Preventing Account Takeover Attacks: Ways to Reduce Risk." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Account takeover attacks (ATOs) have become an increasingly prevalent and costly threat to individuals and organizations alike. Cybercriminals use various methods, such as phishing, credential stuffing, and exploiting leaked data, to gain unauthorized access to user accounts and exploit them for financial gain or other malicious purposes. In this article, we will explore account takeover […]

5 Common Ransomware Attack Vectors

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "5 Common Ransomware Attack Vectors." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Ransomware attacks have become an increasingly prevalent cyber threat, affecting organizations of all sizes and industries. These malicious software programs encrypt the victim’s data and demand a ransom in exchange for the decryption key. With the commodification of cybercrime, threat actors are escalating from single extortion ransomware model to double and triple extortion.  Read our […]

Open Source Threat Intelligence Tools & Feeds: A Complete 2023 List

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Open Source Threat Intelligence Tools & Feeds: A Complete 2023 List." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The rapidly evolving cyber threat landscape demands constant vigilance from organizations seeking to protect their digital assets. Open source threat intelligence tools and feeds have emerged as invaluable resources in this endeavor, offering insights into current trends, vulnerabilities, and threat actors. In this article, we will provide a comprehensive list of open source threat intelligence […]

What are Indicators of Compromise in Threat Intelligence?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What are the Indicators of Compromise in Threat Intelligence?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Managing security in today’s highly interconnected world can be like trying to put out fires with a collection of squirt guns. You have the tools, but they never feel powerful enough. With security teams working tirelessly to protect systems, networks, and data, they need the information that empowers them by helping them prioritize their activities. […]

Attack Surface Analysis: 3 Keys to Success

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Analysis: 3 Keys to Success." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Attack surfaces are constantly expanding. Thanks to prevalent use of the cloud, more interconnected applications, and more smart devices, the digital footprints of most organizations are growing. With those apps and devices, however, come more vulnerabilities for attackers to exploit. According to a recent report, 2 out of 3 organizations say their external attack surface […]

Threat Intelligence Management: Best Practices

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence Management Best Practices." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Security teams rely on threat intelligence like a ship’s captain relies on a lighthouse. The information enables them to see new risks and steer clear of known threats. While threat intelligence provides benefits, many security teams struggle to use it effectively. They collect the information from various tools, meaning that they have no single source […]

Browser Fingerprint Spoofing: A New Cyber Risk

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Browser Fingerprint Spoofing: A New Cyber Risk." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

If one sure thing exists in the security and privacy area, it’s that cybercriminals will always find ways to use technological advances against users. With the internet as a fundamental communication and commercial technology, data derived from users’ online activities has become more important to businesses and organizations. Most companies use browser fingerprinting for legitimate […]

Threat Tracking: Tracking Threats Across the Dark and Clear Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Tracking: Tracking Threats Across the Dark and Clear Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Internet is a gold mine of threat information that can bolster your cyber defenses if you actively track this data. From news updates to forum discussions on hacker forums, and data dumps to service offerings on marketplaces, there’s a lot to find out that could otherwise slip under the radar.  Tracking cyber threats across […]

9 Open Source Threat Intelligence Sources

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "9 Open Source Threat Intelligence Sources." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Keeping up with cybersecurity news is a challenge. From newly discovered vulnerabilities to new attack methodologies, you live a life of “need to know” when ability to find is difficult. As a security professional, knowing is more than half the battle. To stay within your budget, you need the open source threat intelligence resources that […]

Log4j, GitHub Repositories, and Attack Surfaces

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Log4j, GitHub Repositories, and Attack Surfaces." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Numerous security practitioners and software development teams often utilize public repositories in their daily roles. The goal of these public repositories is to help teams collaborate on improving coding, fixing vulnerabilities, and support building high-quality software for companies. Two of the most popular types of these repositories are Log4j and GitHub. These two repositories have been […]