A Quick Guide: How to Leverage Web Reconnaissance Tools

How to Leverage Web Reconnaissance Tools

What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]

Continuous Monitoring of Web Reconnaissance Platform

Continous Monitoring of Web Recon

Using web reconnaissance platforms to monitor your attack surface or run investigations can be time-consuming, especially when we’re looking to understand what happened at a point in time in the past. These platforms do sometimes provide a view on all the past collected data included in a paid subscription, but navigating and interpreting the information […]

Why Clustering Malicious Actors Using AI Can Help with Organizational Cyber Risk – Part One

Clustering Malicious Actors Using AI - Part 1

In today’s digital world, malicious actors have access to a multitude of ways to preserve and increase their anonymity online. We recently posted an article highlighting various Open-Source Intelligence (OSINT) methods to profile cybercriminals on the darkweb, and you could consider this a follow-up and in-depth dive into the Artificial Intelligence (AI) based technologies we […]

What is Data Leakage? How Do You Prevent It?

What is Data Leakage

During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]

What Is an Attack Surface and How do you Reduce it?

What is an Attack Surface

What Is An Attack Surface? An attack surface is the total number of all possible attack vectors (or points) where an attacker or unauthorized user can access a system and enter or extract data.  Attack surfaces can be split into two different categories. 1. Physical Attack Surface A physical attack surface area for an organization […]

Digital Risk Monitoring: A Quick Introduction

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Digital Risk Monitoring?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. At the same time major software providers such as Solarwinds have been the victim of large scale compromises. To counter the […]

What Is Domain Monitoring?

 Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line different from past emails. Your spam filter may have even caught the email and flagged it as a potential […]

Dark Web Threat Intelligence: A Quick Guide

dark web threat intelligence

Building cyber threat intelligence capabilities has never been more important than in 2021. Attacks against businesses of all sizes are increasing rapidly. At the same time, the criminal underground is larger and more differentiated than ever. A single cyberattack against a business might involve dozens of threat actors each performing highly specialized roles. Gaining visibility […]