Operational Threat Intelligence: The Definitive Guide
Cyber threat intelligence involves gathering and analyzing an assortment of disparate data to help make prompt and effective security decisions related to current or potential attacks and adversaries. But simply lumping all of this information under a general label like “cyber threat intelligence” ignores the fact that there are different ways to categorize this data […]
Data Breach Prevention: Identifying Leaked Credentials on the Dark Web
Threat actors deploy many tactics, techniques and procedures (TTPs) to get access to sensitive data assets. Among this arsenal of weapons, obtaining correct user credentials (username and password pairs) that can be used for credential stuffing attacks plays a central role in most data breaches. Poor password hygiene makes some credentials easy to guess. Social engineering […]
The Threat Intelligence Lifecycle: A Definitive Guide for 2023
Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together and stay on top of […]
Threat Intelligence in 2023: The Definitive Guide
Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to effectively collect intelligence from hundreds […]
Top 5 Most Asked Questions at BSides
This year, the Flare team had many opportunities to attend BSides conferences across Canada and the U.S. It was a special experience to join local BSides conferences as well as travel to cities and visit cybersecurity communities. BSides conferences mean a lot to us at Flare because hosting affordable, local events that foster a cybersecurity […]
OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023
OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]
Attack Surface Monitoring: The Definitive 2023 Guide
Today’s threat actors constantly probe your IT ecosystem for ways to gain unauthorized access and achieve their goals. Thinking like an attacker to figure out the paths of least resistance into your environment is imperative in protecting your digital assets and thwarting attacks. These paths together make up your attack surface—the complete set of entry […]
Building Your Threat Hunting Framework: Key Considerations
Threat hunting shifts security operations from reactive to proactive by searching for signs of attacker tactics, techniques, and procedures (TTP) within an environment that have evaded or haven’t yet been picked up by existing detection technologies. Part of the difficulty of efficient and successful threat hunting is that it’s often conducted chaotically due to a […]
Spooky Ways to Ruin a Cybercriminal’s Day
It’s challenging to ruin a cybercriminal’s day because they only need one thing to work to gain access, while organizations must protect every potential attack surface. However, there are ways for everyone to contribute to a threat actor having a bad day. We’ll discuss some major areas that work to malicious actors’ advantages (which can […]
How to Apply Natural Language Processing to Cyber Threat Intelligence
The dark web is challenging to monitor. On top of it being structurally difficult to navigate, malicious actors have a unique vocabulary that is complex to understand for outsiders. Web scraping and web crawling enable extracting and indexing information on a larger scale. These tools need manually written rules to function. Since these processes require […]