Year: 2022
We’re Moving! – Websites, That Is
December 15, 2022 | 1 Min Read
APT Spotlight Series: Sandworm
December 8, 2022 | 4 Min Read
Vulnerability Intelligence Roundup: Five lessons learned since Log4Shell
November 29, 2022 | 4 Min Read
Keeping one step ahead of Black Friday cyber threats
November 16, 2022 | 5 Min Read
Dark Web Recruitment: Malware, Phishing, and Carding
November 10, 2022 | 12 Min Read
Cyber Threats to the FIFA World Cup Qatar 2022
November 10, 2022 | 14 Min Read
2023 Cyber Threat Predictions
November 1, 2022 | 14 Min Read
Q3 2022 Vulnerability Roundup
October 26, 2022 | 5 Min Read
Cybersecurity Awareness Month 2022: Have you forgotten about phishing?
October 25, 2022 | 7 Min Read
Alternative Future Analysis: Pro-Russian Hacktivism
October 20, 2022 | 7 Min Read
Ransomware In Q3 2022
October 19, 2022 | 11 Min Read
The Optus Breach: If I Could Turn Back Time
October 5, 2022 | 6 Min Read
Dark Web Recruitment: How Ransomware Groups Hire Cybercriminal Talent
September 27, 2022 | 10 Min Read
Who’s next in Lapsus$’ crosshairs?
September 26, 2022 | 7 Min Read
Cyber threats to the 2022 Italian elections
September 22, 2022 | 6 Min Read
What we’re reading this month: September 2022
September 21, 2022 | 7 Min Read
Vulnerability Intelligence Roundup: Five RCE Vulnerabilities to Prioritize in September
September 20, 2022 | 4 Min Read
Ransomware franchising: How do groups get started?
September 15, 2022 | 10 Min Read
There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam
September 14, 2022 | 7 Min Read
APT Spotlight Series: APT41
September 7, 2022 | 8 Min Read
“I’m tired of living in poverty” – Russian-Speaking Cyber Criminals Feeling the Economic Pinch
September 1, 2022 | 6 Min Read
“Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban
August 31, 2022 | 10 Min Read
What We’re Reading This Month: August 2022
August 25, 2022 | 6 Min Read
Vulnerability Intelligence RoundUp: Cloudy with a chance of zero days
August 24, 2022 | 6 Min Read
Honker Union: Has the grandfather of Chinese Hacktivism returned?
August 18, 2022 | 6 Min Read
Stop the line: Cyber threats facing manufacturing
August 17, 2022 | 8 Min Read
Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum
August 10, 2022 | 8 Min Read
Tensions between the PRC and Taiwan: What’s happening?
August 9, 2022 | 6 Min Read
ReliaQuest and Digital Shadows – The Next Stage of the Journey
August 3, 2022 | 3 Min Read
The Boy Who Cried Ransomware: The Trustworthiness of Ransomware Groups
August 2, 2022 | 8 Min Read
Black Hat USA 2022
August 1, 2022 | 2 Min Read
HolyGhost’s Bargain Basement Approach to Ransomware
July 28, 2022 | 6 Min Read
What We’re Reading This Month: July 2022
July 27, 2022 | 7 Min Read
How to Paint your Best Cyber Threat Landscape: My Three Top Tips from ENISA’s Methodology Report
July 21, 2022 | 6 Min Read
Breach Forums – When student becomes the teacher
July 20, 2022 | 6 Min Read
Q2 2022 Vulnerability Roundup
July 19, 2022 | 5 Min Read
Offensive nation-state cyber threats: Who takes the top spot?
July 15, 2022 | 8 Min Read
RANSOMWARE IN Q2 2022: RANSOMWARE IS BACK IN BUSINESS
July 11, 2022 | 11 Min Read
What we’re reading this month: June 2022
July 5, 2022 | 7 Min Read
Market differentiation: Cybercriminal forums’ unusual features designed to attract users
June 30, 2022 | 13 Min Read
NATO Leaders are Meeting at the Madrid Summit 2022: What is going to happen?
June 28, 2022 | 6 Min Read
Credential stuffing: What is it, are you at risk?
June 23, 2022 | 6 Min Read
Vulnerability Intelligence Roundup: Leveraging the OODA Loop for Vulnerability Management
June 21, 2022 | 8 Min Read
POLONIUM: Proxy Warfare and Iran’s Cyber Strategy
June 20, 2022 | 7 Min Read
Weak credentials are fueling a new generation of cyber threats
June 15, 2022 | 7 Min Read
Ransomware gangs and PR stunts: Why LockBit faked a ransomware attack against Mandiant
June 10, 2022 | 5 Min Read
Killnet: The Hactivist Group That Started A Global Cyber War
June 8, 2022 | 7 Min Read
The next stage of our journey – Digital Shadows to join ReliaQuest
June 1, 2022 | 6 Min Read
Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?
May 31, 2022 | 10 Min Read
Account takeover: Are you opening the door for cyber threat actors?
May 25, 2022 | 6 Min Read
Vulnerability Intelligence Round Up: The Good, The Bad, and The Risky
May 19, 2022 | 6 Min Read
What we’re reading this month: May 2022
May 18, 2022 | 7 Min Read
Advanced persistent threat group feature: Mustang Panda
May 17, 2022 | 7 Min Read
Five years after the WannaCry dumpster fire, ransomware remains a global threat
May 11, 2022 | 7 Min Read
ALPHV: The First Rust-Based Ransomware
May 6, 2022 | 7 Min Read
Colonial Pipeline One Year Later: What’s Changed?
May 4, 2022 | 10 Min Read
The Russia – Ukraine war: Two months in
April 28, 2022 | 10 Min Read
Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns
April 27, 2022 | 8 Min Read
The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning
April 21, 2022 | 12 Min Read
What We’re Reading This Month: April 2022
April 20, 2022 | 7 Min Read
The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime
April 20, 2022 | 8 Min Read
Q1 2022 Vulnerability Roundup
April 14, 2022 | 6 Min Read
Q1 2022 Ransomware Roundup
April 12, 2022 | 12 Min Read
Intelligence Collection Plans: Preparation breeds success
April 7, 2022 | 6 Min Read
Team A vs Team B: What is Motivating Lapsus$?
April 6, 2022 | 8 Min Read
Five things we learned from the Conti chat logs
April 5, 2022 | 11 Min Read
The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining
March 31, 2022 | 8 Min Read
“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions
March 29, 2022 | 10 Min Read
Vulnerability Intelligence Round-up: Russia-Ukraine War
March 24, 2022 | 6 Min Read
The Okta breach: What we know so far
March 23, 2022 | 10 Min Read
Russia’s Second Front: The War on Information
March 22, 2022 | 9 Min Read
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business
March 17, 2022 | 5 Min Read
The Russia-Ukraine War And The Revival Of Hacktivism
March 16, 2022 | 4 Min Read
Biden’s Executive Order on Crypto: What you need to know
March 15, 2022 | 7 Min Read
Exploring SIM Swapping Services on Cybercriminal Forums
March 10, 2022 | 10 Min Read
Can cryptocurrency be used to bypass the impact of sanctions being applied against Russia?
March 9, 2022 | 10 Min Read
What We’re Reading this Month: March 2022
March 3, 2022 | 7 Min Read
Intelligence Requirements: Planning your cyber response to the Russia-Ukraine war
March 1, 2022 | 11 Min Read
Cybercriminals React to Ukraine-Russia Conflict
February 25, 2022 | 7 Min Read
Russian Cyber Threats: Practical Advice For Security Leaders
February 25, 2022 | 11 Min Read
Russia Invades Ukraine: What happens next?
February 24, 2022 | 5 Min Read
Recruitment Fraud in 2022
February 23, 2022 | 3 Min Read
Of Death and Taxes: File Early To Beat The Scammers
February 22, 2022 | 7 Min Read
“No cards = no work = no money”: Russian law enforcement’s assault on carding platforms
February 18, 2022 | 9 Min Read
Initial Access Brokers in 2021: An Ever Expanding Threat
February 16, 2022 | 11 Min Read
Automate Alert Investigation and Response with XSOAR and SearchLight
February 11, 2022 | 3 Min Read
Valentine’s Day: Share your love, not your credentials
February 9, 2022 | 6 Min Read
Growing Tension Between Russia and Ukraine: Should you be concerned?
February 9, 2022 | 9 Min Read
CVEs You Might Have Missed While Log4j Stole the Headlines
February 8, 2022 | 19 Min Read
Beijing 2022: Why you should or shouldn’t care about the Winter Olympics
February 3, 2022 | 9 Min Read
What We’re Reading This Month – January 2022
February 2, 2022 | 8 Min Read
Vulnerability Intelligence: Introducing SearchLight’s Newest Capability
January 31, 2022 | 4 Min Read
Life in Prison: The Cybercriminal Perspective
January 27, 2022 | 9 Min Read
Vulnerability Intelligence: A Best Practice Guide
January 26, 2022 | 4 Min Read
Navigating the Threat Intelligence Market in 2022
January 20, 2022 | 4 Min Read
Ransomware Q4 Overview
January 19, 2022 | 12 Min Read
Making Sense of the REvil Arrests
January 14, 2022 | 7 Min Read
How Do Ransomware Groups Launder Payments?
January 10, 2022 | 7 Min Read
Cyber Threats to Education
January 6, 2022 | 3 Min Read