All Posts

Show
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
July 17, 2018 read more

The 2017 FSB indictment and Mitre ATT&CK™

September 20, 2018

On  February 28th, 2017 the US Department of Justice indicted a notorious hacker, Alexsey Belan, and his FSB (Russia’s internal …

read more

Non-traditional State Actors: New Kids on the Block

September 18, 2018

Cyber threat reporting sits at a dichotomy. On the one hand, much furor is made of the role of non-state …

read more

ShadowTalk Update – 09.17.2018

September 17, 2018

In this week’s ShadowTalk, Richard Gold and Simon Hall join Michael Marriott to discuss the latest spate of attacks by …

read more

Airline Discovers Trove of Frequent Flyer Accounts Compromised and Posted for Sale Online

September 14, 2018

Reward program fraud has been rising in recent years across the aviation industry as well as the entire transportation sector. …

read more

MITRE ATT&CK™ and the North Korean Regime-Backed Programmer

September 13, 2018

On 6th September the US Department of Justice (DOJ) unsealed an indictment against a North Korean regime-backed programmer who is …

read more

GAO’s Equifax Post-mortem Report

September 11, 2018

It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. …

read more

ShadowTalk Update – 09.10.2018

September 10, 2018

In this week’s ShadowTalk, Richard Gold and Rafael Amado join Michael Marriott to discuss the latest Department of Justice complaint …

read more

Sextortion – When Persistent Phishing Pays Off

September 6, 2018

You may have heard of a recent surge in sextortion-based phishing campaigns. These campaigns seek to extort victims by threatening …

read more

Online Risks to Fortnite Users

September 4, 2018

With an enticing array of viral dance moves, tough weekly challenges and fresh skins, people are going bananas for Fortnite. …

read more

ShadowTalk Update – 09.03.2018

September 3, 2018

Not a week goes by without an example where credential stealing, credential reuse, or poor password practices contributed heavily to …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive