A Quick Guide: How to Leverage Web Reconnaissance Tools

What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]
The Result of Clustering Malicious Actors Through Artificial Intelligence – Part Three

Welcome to the final installment of this three-part blog series, where we will go over the results presented in Flare of our new Similar Actor Model. As a reminder, in part one, we discussed why we believe that using artificial intelligence for clustering malicious actors could help organizations in monitoring the dark web more effectively, […]
How Artificial Intelligence Can Help With Clustering Malicious Actors And Decrease Organizational Cyber Risk – Part two

Welcome to part two of our three-part blog series. In part one we discussed why we believe that using artificial intelligence for clustering malicious actors could help organizations in monitoring the dark web more effectively. In the second installment of this Artificial Intelligence (AI) series, we will delve deeper into Natural Language Processing (NLP), a […]
Continuous Monitoring of Web Reconnaissance Platform

Using web reconnaissance platforms to monitor your attack surface or run investigations can be time-consuming, especially when we’re looking to understand what happened at a point in time in the past. These platforms do sometimes provide a view on all the past collected data included in a paid subscription, but navigating and interpreting the information […]
Why Clustering Malicious Actors Using AI Can Help with Organizational Cyber Risk – Part One

In today’s digital world, malicious actors have access to a multitude of ways to preserve and increase their anonymity online. We recently posted an article highlighting various Open-Source Intelligence (OSINT) methods to profile cybercriminals on the darkweb, and you could consider this a follow-up and in-depth dive into the Artificial Intelligence (AI) based technologies we […]
What is Data Leakage? How Do You Prevent It?

During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]
What Is an Attack Surface and How do you Reduce it?

What Is An Attack Surface? An attack surface is the total number of all possible attack vectors (or points) where an attacker or unauthorized user can access a system and enter or extract data. Attack surfaces can be split into two different categories. 1. Physical Attack Surface A physical attack surface area for an organization […]
Digital Risk Monitoring: A Quick Introduction

It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. At the same time major software providers such as Solarwinds have been the victim of large scale compromises. To counter the […]
What Is Domain Monitoring?

Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line different from past emails. Your spam filter may have even caught the email and flagged it as a potential […]
Dark Web Threat Intelligence: A Quick Guide

Building cyber threat intelligence capabilities has never been more important than in 2021. Attacks against businesses of all sizes are increasing rapidly. At the same time, the criminal underground is larger and more differentiated than ever. A single cyberattack against a business might involve dozens of threat actors each performing highly specialized roles. Gaining visibility […]