All Posts

Show
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation
March 12, 2020 read more

Hacktivism, it’s not all DoSing around

September 12, 2016

Hacktivism isn’t all high levels of low impact activity. There were a number of hacktivist campaigns we detected in the …

read more

Show me the context: The hacking proof of concept

September 8, 2016

A common feature at security conferences, especially those that demonstrate hacks, is the proof of concept. This typically involves a security …

read more

The cyber defender and attacker imbalance – a disproportionate impact

September 6, 2016

You might be forgiven for thinking that high-impact cyber-attacks are always the work of well-funded nation states, organized criminal groups …

read more

Hybrid cyber/physical criminal operations – where network intrusions meet the physical world

August 30, 2016

At some stage, almost every crime committed online has a physical element, often when the money obtained is used to …

read more

Bozkurt to Buhtrap: Cyber threats affecting financial institutions in 1H 2016

August 23, 2016

At the beginning of 2016, it was reported that two suspected members of the DD4BC, a DDoS extortion group, were …

read more

Four Things We’ve Learned From the Alleged Equation Group Code Leak

August 22, 2016

The wake of the deeply bizarre auction of toolkits alleged to be from the Equation Group by the self-proclaimed “Shadow …

read more

Security Culture: You’re only as strong as your team

August 18, 2016

When you’re hurt you feel pain, you see a cut or bruise, and you know that something has happened to …

read more

False flags in cyber intrusions – why bother?

August 17, 2016

False flag operations have long existed in the physical world, a tactic used to make an operation appear to have …

read more

Forecasting OpOlympicHacking

August 15, 2016

We recently published a report on the eight cybersecurity considerations around Rio 2016. But what have we observed so far, …

read more

“Air cover” – cybercriminal marketing and the media

August 10, 2016

For a new or relatively unknown cybercriminal actor looking to sell compromised data, attracting buyers can be a difficult task. …

read more

Overexposure – photos as the missing link

August 3, 2016

You have heard it all before ­– recycling passwords for multiple services can be catastrophic. One service being breached and …

read more

More Data Leaks as part of OpOlympicHacking

July 28, 2016

In our recent research, we demonstrated eight cybersecurity considerations around Rio 2016. The paper lays out hacktivism and cybercrime threats …

read more

Gambling with Security in Vegas: Not Your Best Bet

July 27, 2016

With BSides Las Vegas, Black Hat, and DEF CON around the corner, security is likely at the forefront of many …

read more

Getting In Gear: Accounting for Tactical and Strategic Intelligence

July 26, 2016

We’ve written before about how we like to map our services to the intelligence cycle. Of course, the intelligence cycle …

read more

Thedarkoverlord – losing his patients?

July 26, 2016

In late June 2016, we observed a spate of attacks allegedly conducted by a vendor named “thedarkoverlord” on the dark …

read more

5 Takeaways From The “Building A Strategic Threat Intelligence Program” Webinar

July 26, 2016

Last week, the great Mike Rothman (of Securosis fame) and I did a webinar titled: “Building a Strategic Threat Intelligence …

read more

Tracking the Field: Eight cybersecurity considerations around Rio 2016

July 25, 2016

Last week, we saw reports of individuals arrested on charges of terrorism ahead of the upcoming games in Rio. This …

read more

PoodleCorp: in the business of kudos

July 22, 2016

PoodleCorp claimed to have successfully rendered the servers of the Android and iOS game Pokemon Go offline using several distributed …

read more

Towards a(nother) new model of attribution

July 21, 2016

Actor attribution is a common issue and activity within the world of cybersecurity. At its core, the actor attribution process …

read more

5 Key Lessons From The FDIC’s Breach Disclosure Debacle

July 18, 2016

Last week, the United States House Science, Space and Technology Committee released the scathing results of the committee’s investigations into …

read more

Open Source Intelligence versus Web Search: What’s The Difference?

July 11, 2016

“I can get that from Google!” – is a common phrase that has been directed at me during my time …

read more

Three Tactics Behind Cyber Extortion

July 11, 2016

As explained in a previous blog, extortion is not new – it’s now just been applied to the digital world …

read more

Modern crimeware campaigns – two bytes of the cherry

July 5, 2016

To a Columbian drug lord, the most valuable commodity is probably cocaine. To many financially motivated cybercriminals, the most valuable …

read more

10 ways to prepare for credential leak incidents

June 30, 2016

From LinkedIn to MySpace, threat actors like Peace of Mind and Tessa88 have been selling credentials in various criminal dark …

read more

Recycling, bad for your environment!

June 27, 2016

The news is constantly flooded with yet another breach of a high profile vendor. Perhaps the biggest and most publicized …

read more