Category: Threat Intelligence
Account takeover: Are you opening the door for cyber threat actors?
May 25, 2022 | 6 Min Read
Vulnerability Intelligence Round Up: The Good, The Bad, and The Risky
May 19, 2022 | 6 Min Read
What we’re reading this month: May 2022
May 18, 2022 | 7 Min Read
Advanced persistent threat group feature: Mustang Panda
May 17, 2022 | 7 Min Read
Five years after the WannaCry dumpster fire, ransomware remains a global threat
May 11, 2022 | 7 Min Read
ALPHV: The First Rust-Based Ransomware
May 6, 2022 | 7 Min Read
Colonial Pipeline One Year Later: What’s Changed?
May 4, 2022 | 10 Min Read
The Russia – Ukraine war: Two months in
April 28, 2022 | 10 Min Read
Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns
April 27, 2022 | 8 Min Read
The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning
April 21, 2022 | 12 Min Read
What We’re Reading This Month: April 2022
April 20, 2022 | 7 Min Read
Q1 2022 Vulnerability Roundup
April 14, 2022 | 6 Min Read
Q1 2022 Ransomware Roundup
April 12, 2022 | 12 Min Read
Intelligence Collection Plans: Preparation breeds success
April 7, 2022 | 6 Min Read
Team A vs Team B: What is Motivating Lapsus$?
April 6, 2022 | 8 Min Read
Five things we learned from the Conti chat logs
April 5, 2022 | 11 Min Read
The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining
March 31, 2022 | 8 Min Read
Vulnerability Intelligence Round-up: Russia-Ukraine War
March 24, 2022 | 6 Min Read
Russia’s Second Front: The War on Information
March 22, 2022 | 9 Min Read
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business
March 17, 2022 | 5 Min Read
The Russia-Ukraine War And The Revival Of Hacktivism
March 16, 2022 | 4 Min Read
Biden’s Executive Order on Crypto: What you need to know
March 15, 2022 | 7 Min Read
Can cryptocurrency be used to bypass the impact of sanctions being applied against Russia?
March 9, 2022 | 10 Min Read
Intelligence Requirements: Planning your cyber response to the Russia-Ukraine war
March 1, 2022 | 11 Min Read
Cybercriminals React to Ukraine-Russia Conflict
February 25, 2022 | 7 Min Read
Russian Cyber Threats: Practical Advice For Security Leaders
February 25, 2022 | 11 Min Read
Russia Invades Ukraine: What happens next?
February 24, 2022 | 5 Min Read
Recruitment Fraud in 2022
February 23, 2022 | 3 Min Read
“No cards = no work = no money”: Russian law enforcement’s assault on carding platforms
February 18, 2022 | 9 Min Read
Initial Access Brokers in 2021: An Ever Expanding Threat
February 16, 2022 | 11 Min Read
Growing Tension Between Russia and Ukraine: Should you be concerned?
February 9, 2022 | 9 Min Read
CVEs You Might Have Missed While Log4j Stole the Headlines
February 8, 2022 | 19 Min Read
Beijing 2022: Why you should or shouldn’t care about the Winter Olympics
February 3, 2022 | 9 Min Read
What We’re Reading This Month – January 2022
February 2, 2022 | 8 Min Read
Vulnerability Intelligence: Introducing SearchLight’s Newest Capability
January 31, 2022 | 4 Min Read
Life in Prison: The Cybercriminal Perspective
January 27, 2022 | 9 Min Read
Vulnerability Intelligence: A Best Practice Guide
January 26, 2022 | 4 Min Read
Ransomware Q4 Overview
January 19, 2022 | 12 Min Read
Making Sense of the REvil Arrests
January 14, 2022 | 7 Min Read
How Do Ransomware Groups Launder Payments?
January 10, 2022 | 7 Min Read