Threat Intelligence

A Christmas 2020 Review: Confronting and controlling insider threats
December 21, 2020 | 6 Min Read

QUO, QUO, QUO! Merry Christmas…..
December 21, 2020 | 7 Min Read

Top Five ShadowTalk Episodes of the Year
December 17, 2020 | 4 Min Read

Holiday Cybercrime: Krampus is in Town
December 15, 2020 | 7 Min Read

SolarWinds Compromise: What security teams need to know
December 14, 2020 | 5 Min Read

Impersonator Syndrome: Supply chain lures and COVID-19 cures
December 9, 2020 | 3 Min Read

The Top 3 Cybersecurity Threats In The Middle East
December 2, 2020 | 7 Min Read

2021 Forecasts: Six Trends And Predictions For The New Year
December 1, 2020 | 18 Min Read

ShadowTalk Update: Egregor Ransomware, IoT Regulations, Black Friday Threats and More!
November 30, 2020 | 2 Min Read

Egregor: The New Ransomware Variant to Watch
November 24, 2020 | 9 Min Read

SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster
November 23, 2020 | 5 Min Read

Holiday Cybercrime: Retail Risks and Dark Web Kicks
November 19, 2020 | 7 Min Read

ShadowTalk Update: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
November 16, 2020 | 2 Min Read

To Code or Not to Code? Cybercriminals and the world of programming
November 12, 2020 | 9 Min Read

A Eulogy for Maze: The end of a ransomware era?
November 9, 2020 | 6 Min Read

Simplifying Cybercriminal Jargon: A Glossary of Cybercriminal Access Offerings
November 2, 2020 | 15 Min Read

Cybersecurity Awareness Month: Week 4 – The Future of Connected Devices
October 28, 2020 | 8 Min Read

Marcus Carey Joins ShadowTalk
October 23, 2020 | 3 Min Read

Dark pathways into cybercrime: Minding the threat actor talent gap
October 21, 2020 | 11 Min Read

Cybersecurity Awareness Month: Week 3 – Securing Internet- Connected Devices in Healthcare
October 21, 2020 | 9 Min Read

Quarterly Update: Ransomware Trends in Q3
October 19, 2020 | 8 Min Read

Digital Shadows Analysis of Europol’s Cybercrime Report
October 14, 2020 | 12 Min Read

Cybersecurity Awareness Month: Week 2 – Security Devices at Home and Work
October 14, 2020 | 7 Min Read

Clickbait to Checkmate: SMS-based scam targets US smartphones and accesses victim locations
October 13, 2020 | 11 Min Read

Cybersecurity Awareness Month: Week 1 – If you Connect It, Protect It
October 8, 2020 | 6 Min Read

Help your development teams keep their keys safe
October 7, 2020 | 3 Min Read

Let’s get ready to tumble! Bitcoin vs Monero
October 6, 2020 | 13 Min Read

Recent arrests and high-profile convictions: What does it mean for the cyber threat landscape?
September 30, 2020 | 13 Min Read

Four Ways to Validate Credentials in SearchLight
September 29, 2020 | 3 Min Read

Cybercriminals Targeting SAP RECON
September 29, 2020 | 5 Min Read

Unpicking Cybercriminals’ Personalities – Part 2: Morality and Forum Dynamics
September 28, 2020 | 7 Min Read

ShadowTalk Update – Law Enforcement Cracks Down On Cybercriminals, Fancy Bear Goes Phishing, And More
September 28, 2020 | 2 Min Read

RECAP: Discussing deception with Chris Sanders
September 24, 2020 | 3 Min Read

Unpicking Cybercriminals’ Personalities – Part 1: Gender and Nationality
September 23, 2020 | 9 Min Read

DarkSide: The new ransomware group behind highly targeted attacks
September 22, 2020 | 8 Min Read

ShadowTalk Update – Ed Merrett Joins To Talk HackableYou And The Latest In Threat Intel
September 21, 2020 | 2 Min Read

With the Empire falling, who will take over the throne?
September 16, 2020 | 10 Min Read

Access Keys Exposed: More Than 40% Are For Database Stores
September 14, 2020 | 6 Min Read

ShadowTalk Update – The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again
September 14, 2020 | 2 Min Read

Recruitment fraud: Don’t spook your dream candidates this halloween
September 10, 2020 | 4 Min Read

Cyber espionage: How to not get spooked by nation-state actors
September 8, 2020 | 8 Min Read

ShadowTalk Update – New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer Kitten updates
September 7, 2020 | 2 Min Read

Revisiting Typosquatting and the 2020 US Presidential Election
September 2, 2020 | 11 Min Read

What is DevSecOps and Why Do We Need It?
August 12, 2020 | 4 Min Read

Dread takes on the spammers – who will come out on top?
August 28, 2020 | 9 Min Read

RECAP: Discussing the evolution and trends of cybercrime with Geoff White
August 25, 2020 | 8 Min Read

Validate Exposed Credentials with Okta to Save Even More Time
August 24, 2020 | 3 Min Read

ShadowTalk Update – Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121
August 24, 2020 | 3 Min Read

Dark Web Forums: The new kid on the block
August 18, 2020 | 12 Min Read

Optiv CTIE 2020: COVID-19, cybercrime, and third-party risk
August 17, 2020 | 10 Min Read

ShadowTalk Update – Defaced Subreddits, Intel Leak Drama on Twitter, and HIBP Goes Open-Source
August 17, 2020 | 2 Min Read

It’s even easier to initiate takedowns in SearchLight
August 12, 2020 | 3 Min Read

Escrow systems on cybercriminal forums: The Good, the Bad and the Ugly
August 11, 2020 | 15 Min Read

ShadowTalk Update – CWT pays ransom, data leaked for 900+ Pulse Secure Servers, EU issues first cyber sanctions
August 10, 2020 | 2 Min Read

Saving the SOC from overload by operationalizing digital risk protection
August 5, 2020 | 4 Min Read

The story of Nulled: Old dog, new tricks
August 4, 2020 | 9 Min Read

ShadowTalk Update – Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2
August 3, 2020 | 3 Min Read

Dark Web Travel Agencies Revisited: The Impact of Coronavirus on the Shadow Travel Industry
July 29, 2020 | 10 Min Read

Account takeover: Expanding on impact
July 27, 2020 | 7 Min Read

ShadowTalk Update – Trickbot trojan mishaps, Emotet resurgence, Twitter takeovers, and APT group updates
July 27, 2020 | 2 Min Read

Ransomware Trends in Q2: How Threat Intelligence Helps
July 22, 2020 | 8 Min Read

Jira Atlassian SearchLight Integration
July 21, 2020 | 2 Min Read

Abracadabra! – CryptBB demystifying the illusion of the private forum
July 15, 2020 | 8 Min Read

SearchLight’s Credential Validation: Only Focus on What Matters
July 14, 2020 | 4 Min Read

Tax Fraud in 2020: Down But Not Out
July 13, 2020 | 4 Min Read

ShadowTalk Update – PAN-OS Vulnerability, Lazarus Group, BEC scammer “Hushpuppi”, and New Photon ATO Research
July 13, 2020 | 2 Min Read

From Exposure to Takeover: Part 1. Beg, borrow, and steal your way in
July 7, 2020 | 9 Min Read

Digital Risk Reporting Best Practices: Top 10 Ways to Build Killer Reports in SearchLight
June 30, 2020 | 4 Min Read

ShadowTalk Update – Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick
June 29, 2020 | 2 Min Read

ShadowTalk Update – Lookback Operators Deploy New Malware Against US Utilities Sector And Honda Cyber Attack
June 22, 2020 | 2 Min Read

ShadowTalk Update – Maze Ransomware Alliance, EndGame DDoS Protection Tool, And Ransomware Disguises
June 15, 2020 | 2 Min Read

Security Threat Intel Products and Services: Mapping SearchLight
June 10, 2020 | 6 Min Read

CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020
June 9, 2020 | 7 Min Read

SHADOWTALK UPDATE – HACKTIVIST CHOOSES DESTRUCTION OVER PROFIT W/ RANSOMWARE AND COLLECTION 1 HACKER IDENTIFIED
June 1, 2020 | 2 Min Read

3 Phishing Trends Organizations Should Watch Out For
May 20, 2020 | 16 Min Read

The 2020 Verizon Data Breach Investigations Report: One CISO’s View
May 19, 2020 | 6 Min Read

SHADOWTALK UPDATE – WANNACRY ANNIVERSARY, WORDPRESS PLUGIN VULNERABILITY, AND WELEAKDATA COMPROMISED
May 18, 2020 | 2 Min Read

A NEW DECADE OF CYBER THREATS: LOOKING BACK AT THE TRENDING CYBER TOPICS OF Q1 2020
May 14, 2020 | 10 Min Read

Contact Tracing: Can ‘Big Tech’ Come to the Rescue, and at What Cost?
May 11, 2020 | 13 Min Read

ShadowTalk Update – Competitions On English Forums, Purple Teaming, & Hacker Bribes ‘Roblox’ Insider
May 11, 2020 | 2 Min Read

Threat Intelligence Feeds: Why Context is Key
May 7, 2020 | 10 Min Read

ShadowTalk Update – Microsoft Teams ATO Vulnerability, APT32, & Uptick In Ransomware
May 1, 2020 | 3 Min Read

ShadowTalk Update – Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment
April 27, 2020 | 3 Min Read

What ‘The Wire’ can teach us about cybersecurity
April 21, 2020 | 12 Min Read

ShadowTalk Update – SFO Airport Hack, Fin6, And Sodinokibi Switching From Bitcoin To Monero
April 20, 2020 | 2 Min Read

Zoom Security and Privacy Issues: Week in Review
April 17, 2020 | 10 Min Read

Top Priorities for 3rd party risk assessments
April 16, 2020 | 6 Min Read

ShadowTalk Update – COVID-19 Third Party App Risks, Zoom, and DarkHotel Hackers
April 13, 2020 | 3 Min Read

COVID-19: Risks of Third-Party Apps
April 7, 2020 | 7 Min Read

ShadowTalk Update – Zoom Zero-Day Vulnerabilities and Fin7 Delivering Malware Via Snail Mail
April 6, 2020 | 2 Min Read

The Digital Risk Underdog: Remediation
April 1, 2020 | 4 Min Read

COVID-19: Third-party risks to businesses
March 31, 2020 | 5 Min Read

ShadowTalk Update – Remote Worker Threat Model And Cybercrime Updates
March 30, 2020 | 2 Min Read

COVID-19: Companies and Verticals At Risk For Cyber Attacks
March 26, 2020 | 8 Min Read

Threat Model of a Remote Worker
March 25, 2020 | 7 Min Read

ShadowTalk Update – Slack Vulnerability, Apollon Dark Web Exit Scam, And Online Brand Protection
March 23, 2020 | 3 Min Read

ShadowTalk Update – Necurs Botnet, SMB Vulnerability, Coronavirus Scams, And Dark Web Updates
March 16, 2020 | 2 Min Read

ShadowTalk Update – Banking Trojan Steals Google Authenticator Codes, Ransomware Attacks Epiq, And Tesco Clubcard Fraud
March 9, 2020 | 2 Min Read

ShadowTalk Update – Data Breaches, Stalkerware, and Dopplepaymer ransomware
March 2, 2020 | 2 Min Read

Mapping MITRE ATT&CK to the Equifax Indictment
February 24, 2020 | 6 Min Read

ShadowTalk Update – OurMine hacks FC Barcelona & Olympics twitter handles, Adsense email extortion, & phishing research
February 24, 2020 | 2 Min Read

The evolving story of the Citrix ADC Vulnerability: Ears to the Ground
February 18, 2020 | 4 Min Read

ShadowTalk Update – OurMine Hacks, Equifax Indictment, and SWIFT POC attack
February 17, 2020 | 2 Min Read

The Devil, the Details, and the Analysis of Competing Hypothesis
February 13, 2020 | 5 Min Read

ShadowTalk Update – CTI Frameworks, Wawa Breach Updates, APT34, and Coronavirus Phishing Scams
February 10, 2020 | 3 Min Read

The Iowa Caucus: Third-Party Apps Can Be Risky Business
February 6, 2020 | 7 Min Read

Red Team Blues: A 10 step security program for Windows Active Directory environments
February 6, 2020 | 9 Min Read

How to Operationalize Threat Intelligence: Actionability and Context
February 5, 2020 | 5 Min Read

ShadowTalk Update – SANS CTI Summit, Snake Ransomware, CacheOut, and Citrix Vuln Update
February 3, 2020 | 3 Min Read

Cyber Threat Intelligence Frameworks: 5 Rules for Integrating These Frameworks
January 29, 2020 | 7 Min Read

SANS Cyber Threat Intelligence Summit 2020: A Recap
January 28, 2020 | 9 Min Read

ShadowTalk Update – Citrix Vulnerability, Microsoft Data Breach, and Telnet Credentials Published
January 27, 2020 | 3 Min Read

ShadowTalk Update – NSA Vulnerability Disclosure, Ransomware News, and Iran Updates
January 20, 2020 | 3 Min Read

Third Party Risk: 4 ways to manage your security ecosystem
January 16, 2020 | 5 Min Read

NSA Vulnerability Disclosure: Pros and Cons
January 15, 2020 | 5 Min Read

CVE-2019-19781: Analyzing the Exploit
January 14, 2020 | 4 Min Read

Iran and the United States – start of the long war or return to normal?
January 13, 2020 | 9 Min Read

ShadowTalk Update – Iranian Cyber Threats, Travelex Ransomware Attack, and Exploit Forum updates
January 10, 2020 | 3 Min Read

Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and the ASD Essential 8
January 7, 2020 | 6 Min Read

Iran and Soleimani: Monitoring the Situation
January 7, 2020 | 9 Min Read

Iranian Cyber Threats: Practical Advice for Security Professionals
January 6, 2020 | 8 Min Read