Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

The Threat Landscape Post-COVID-19 and How You Can Address It

home office covid 19 threat

The Covid-19 pandemic has changed not only our perspective on life and work, but also cybersecurity strategy worldwide. The past nearly two years have prompted a shift to digitalization and extensive cloud migration, raising concerns about data security and integrity. Even before the pandemic started, industry reports had estimated that the market would “grow at […]

Noise Reduction and Prioritisation: One Size Does Not Fit All

noise reduction and prioritisation

One man’s trash is another man’s treasure, what one considers undesirable is likely specific to the listener. Or, at least, that is the unwritten rule in several situations, one of which seems to have so far been the threat landscape monitoring tools industry. The endless war against alert fatigue In the infosec community, talking about […]

How to Mitigate the Risks of Token Leaks

risks of token leaks

Access tokens are used in token-based authentication and allow users to access a website, an application or API. After verifying their identity, the user has no need to re-enter their credentials for the lifetime of the token, as the token serves as their entry ticket. When they are created, tokens are granted a defined scope […]

How Prepared Are CISOs for Cloud Security Risks?

cloud services

Since the COVID-19 pandemic started, remote teams have increased reliance on cloud communication and team collaboration services. Although there was interest in cloud adoption far before the pandemic hit, industry research has found that 9 out of 10 organizations have since rushed to adopt cloud services. While this spawns tremendous scalability opportunities, cloud migration may […]

Why your team should be concerned about leaky buckets on the internet

leaky buckets CTI

Since its inception in March 2006, AWS cloud storage option, also referred to as S3 (Simple Storage Service), has generated keen interest due to its low maintenance and configuration, high availability and “pay as you go” accessible pricing. Microsoft jumped on the bandwagon by formally launching its own cloud services in 2010, maintaining ever since […]

What kind of data could your PDF files be leaking online?

pdf files leaked online

In the 2003 timeframe leading up to the Iraq war, a British government representative published a Word document on their website, containing information related to “Iraq’s security and intelligence organizations.” This information had been previously referenced by Colin Powel during a United Nations address. When the British dossier was made public, it was revealed the […]

How Long Have You Thought about Backup Management this Month?

world backup day

We all know we should have backups. It’s not a task we particularly love doing, and it is definitely something that we forget to do unless automated. How many people religiously plugged in their iPhone in their computer to back it up a few years ago, when backups were not sent automatically to the cloud […]

5 Dark Web Questions Security Professionals Need Answered

datavore darkweb questions

We recently participated in Datavore conference where we reflected on our 9 years of experience in collecting intelligence on the dark web and monitoring malicious actors. Over the years, the tools, strategies and targets have changed considerably, and this walk down memory lane was an opportunity to gather our insights in how and why we […]

The Threat of Synthetic Identity Fraud for Businesses and Consumers

synthetic identities

Financial crimes have increased during the pandemic, with nearly 60% of companies reporting synthetic identity fraud attacks and account takeover in 2020. The Federal Reserve warns this is one of the most prevalent types of fraud in the U.S., actively targeting financial institutions such as banks and credit bureaus. In 2017, for instance, 1 million […]