Blog & Resources
The latest advice, opinion and research from our dedicated intelligence analyst team.
What we’re reading this month: May 2022
May 18, 2022 | 7 Min Read
Advanced persistent threat group feature: Mustang Panda
May 17, 2022 | 7 Min Read
Five years after the WannaCry dumpster fire, ransomware remains a global threat
May 11, 2022 | 7 Min Read
ALPHV: The First Rust-Based Ransomware
May 6, 2022 | 7 Min Read
Colonial Pipeline One Year Later: What’s Changed?
May 4, 2022 | 10 Min Read
The Russia – Ukraine war: Two months in
April 28, 2022 | 10 Min Read
Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns
April 27, 2022 | 8 Min Read
The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning
April 21, 2022 | 12 Min Read
What We’re Reading This Month: April 2022
April 20, 2022 | 7 Min Read
The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime
April 20, 2022 | 8 Min Read
Q1 2022 Vulnerability Roundup
April 14, 2022 | 6 Min Read
Q1 2022 Ransomware Roundup
April 12, 2022 | 12 Min Read
Intelligence Collection Plans: Preparation breeds success
April 7, 2022 | 6 Min Read
Team A vs Team B: What is Motivating Lapsus$?
April 6, 2022 | 8 Min Read
Five things we learned from the Conti chat logs
April 5, 2022 | 11 Min Read
The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining
March 31, 2022 | 8 Min Read
“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions
March 29, 2022 | 10 Min Read
Vulnerability Intelligence Round-up: Russia-Ukraine War
March 24, 2022 | 6 Min Read
The Okta breach: What we know so far
March 23, 2022 | 10 Min Read
Russia’s Second Front: The War on Information
March 22, 2022 | 9 Min Read
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business
March 17, 2022 | 5 Min Read
The Russia-Ukraine War And The Revival Of Hacktivism
March 16, 2022 | 4 Min Read
Biden’s Executive Order on Crypto: What you need to know
March 15, 2022 | 7 Min Read
Exploring SIM Swapping Services on Cybercriminal Forums
March 10, 2022 | 10 Min Read
Can cryptocurrency be used to bypass the impact of sanctions being applied against Russia?
March 9, 2022 | 10 Min Read
What We’re Reading this Month: March 2022
March 3, 2022 | 7 Min Read
Intelligence Requirements: Planning your cyber response to the Russia-Ukraine war
March 1, 2022 | 11 Min Read
Cybercriminals React to Ukraine-Russia Conflict
February 25, 2022 | 7 Min Read
Russian Cyber Threats: Practical Advice For Security Leaders
February 25, 2022 | 11 Min Read
Russia Invades Ukraine: What happens next?
February 24, 2022 | 5 Min Read
Recruitment Fraud in 2022
February 23, 2022 | 3 Min Read
Of Death and Taxes: File Early To Beat The Scammers
February 22, 2022 | 7 Min Read
“No cards = no work = no money”: Russian law enforcement’s assault on carding platforms
February 18, 2022 | 9 Min Read
Initial Access Brokers in 2021: An Ever Expanding Threat
February 16, 2022 | 11 Min Read
Automate Alert Investigation and Response with XSOAR and SearchLight
February 11, 2022 | 3 Min Read
Valentine’s Day: Share your love, not your credentials
February 9, 2022 | 6 Min Read
Growing Tension Between Russia and Ukraine: Should you be concerned?
February 9, 2022 | 9 Min Read
CVEs You Might Have Missed While Log4j Stole the Headlines
February 8, 2022 | 19 Min Read
Beijing 2022: Why you should or shouldn’t care about the Winter Olympics
February 3, 2022 | 9 Min Read
What We’re Reading This Month – January 2022
February 2, 2022 | 8 Min Read
Vulnerability Intelligence: Introducing SearchLight’s Newest Capability
January 31, 2022 | 4 Min Read
Life in Prison: The Cybercriminal Perspective
January 27, 2022 | 9 Min Read
Vulnerability Intelligence: A Best Practice Guide
January 26, 2022 | 4 Min Read
Navigating the Threat Intelligence Market in 2022
January 20, 2022 | 4 Min Read
Ransomware Q4 Overview
January 19, 2022 | 12 Min Read
Making Sense of the REvil Arrests
January 14, 2022 | 7 Min Read
How Do Ransomware Groups Launder Payments?
January 10, 2022 | 7 Min Read
Cyber Threats to Education
January 6, 2022 | 3 Min Read
ShadowTalk Year in Review: Top 5 Episodes of 2021
December 30, 2021 | 3 Min Read
AlphaBay’s Return: A slow-burning masterpiece, or a flash in the pan?
December 28, 2021 | 4 Min Read
Year in Review: Our Top Blogs of 2021
December 23, 2021 | 9 Min Read
Log4j: Tokyo Drift
December 22, 2021 | 5 Min Read
US Ban on Huawei: Is this the right approach?
December 22, 2021 | 7 Min Read
Discord: Do You Need to Be Concerned This Christmas?
December 21, 2021 | 7 Min Read
Log4j: What’s Happened Since
December 15, 2021 | 5 Min Read
Cone of Plausibility: Forecasting Ransomware Scenarios in 2022
December 14, 2021 | 10 Min Read
The Log4j Zero-Day: What We Know So Far
December 10, 2021 | 6 Min Read
Latin American Financial Services: Sunny Climes and Cybercrimes
December 9, 2021 | 8 Min Read
2021: An APAC Cyber-security Odyssey
December 8, 2021 | 9 Min Read
Outside the Perimeter: The New Digital Risk Landscape
December 7, 2021 | 6 Min Read
Cyber Threats to Government
December 2, 2021 | 3 Min Read
When acting turns criminal: Deepfakes and voice impersonators in the cybercriminal underground
December 1, 2021 | 13 Min Read
To Disclose, or Not to Disclose: The PoC Dilemma
November 30, 2021 | 6 Min Read
The Patching Nightmare
November 24, 2021 | 7 Min Read
Black Friday: Is there a threat actor in your shopping cart?
November 23, 2021 | 9 Min Read
Emotet is back again: what does it mean?
November 16, 2021 | 4 Min Read
Vulnerability Intelligence: What’s the Word in Dark Web Forums?
November 16, 2021 | 7 Min Read
What is Vulnerability Intelligence?
November 11, 2021 | 6 Min Read
Vulnerable smart contracts and fake blockchains: What do investors need to know?
November 10, 2021 | 10 Min Read
What We’re Reading This Month
November 9, 2021 | 6 Min Read
Initial Access Brokers in Q3 2021
November 3, 2021 | 9 Min Read
Managing your External Attack Surface with SearchLight
November 2, 2021 | 4 Min Read
ENISA 2021 Threat Landscape: Initial Thoughts
November 1, 2021 | 12 Min Read
REvil Dead, And Other Spooky Security Tales
October 27, 2021 | 6 Min Read
Cybersecurity Awareness Month: Week 4 – Cybersecurity first (…middle and last)
October 26, 2021 | 6 Min Read
Ransomware Q3 Roll Up
October 25, 2021 | 11 Min Read
What Is Intellectual Property Protection?
October 20, 2021 | 2 Min Read
Cybersecurity Awareness Month: Week 3 – Explore. Experience. Share
October 19, 2021 | 11 Min Read
REvil Domains Hijacked, Forum Representative Announces Group’s Intention to Go Offline
October 18, 2021 | 5 Min Read
Strategic Threat Intelligence and You: What Does It All Mean?
October 14, 2021 | 4 Min Read
Cybersecurity Awareness Month: Week 2 – Fight the Phish!
October 13, 2021 | 9 Min Read
What is Third Party Risk?
October 6, 2021 | 3 Min Read
Cybersecurity Awareness Month: Week 1 – Managing Your Digital Shadow
October 5, 2021 | 8 Min Read
What We’re Reading This Month: September Edition
September 29, 2021 | 8 Min Read
Tactical Threat Intelligence and You: What Does It All Mean?
September 29, 2021 | 5 Min Read
Why CISOs and Executives Should Care About IABs
September 23, 2021 | 3 Min Read
Data Leakage Detection Best Practices
September 22, 2021 | 3 Min Read
Ukrainian-language Cybercriminal Platforms: A Gap In the Market?
September 21, 2021 | 7 Min Read
Building successful teams on the cybercriminal underground
September 15, 2021 | 7 Min Read
Enhance Executive Protection with SocialMonitor
September 14, 2021 | 3 Min Read
SearchLight Leads the Digital Risk Protection Market
September 10, 2021 | 3 Min Read
AlphaBay’s Return: SWOT Findings
September 9, 2021 | 14 Min Read
What We’re Reading This Month
September 8, 2021 | 6 Min Read
Protecting Against Ransomware: What Role Does Threat Intelligence Play?
September 7, 2021 | 4 Min Read
Preventing Ransomware: Preventing the 300 at Thermopylae
September 2, 2021 | 7 Min Read
Social Media Monitoring Best Practices
September 1, 2021 | 3 Min Read
The Never-ending Ransomware Story
August 31, 2021 | 10 Min Read
The Eeveelution of ShinyHunters: From Data Leaks to Extortions
August 26, 2021 | 7 Min Read
How Cybercriminals Weaponize Social Media
August 25, 2021 | 9 Min Read
No Honor Among Thieves: Scamming the Scammers
August 24, 2021 | 5 Min Read