All Posts

33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
October 9, 2018 read more

Analyzing the 2016 Verizon Data Breach Investigations Report

May 2, 2016

Last week Verizon released the 2016 Data Breach Investigations Report. If you haven’t read it yet, I highly recommend that …

read more

Getting Strategic With Your Threat Intelligence Program

April 26, 2016

Tactical feeds have dominated the threat intelligence narrative for many years, but there is an emerging understanding that there must …

read more

Roboanalyst: The Future of Threat Intelligence?

April 25, 2016

Artificial Intelligence (AI) is currently going through one of its regular hype bubbles. Another dawn of the super-intelligent machine is …

read more

The Hacking Team breach – an attacker’s point of view

April 22, 2016

On 17 April 2016, two posts were added to Pastebin (one in Spanish, the other in English) detailing the alleged …

read more

Continuous monitoring: four considerations

April 11, 2016

When striving to understand threats outside of an organization’s boundary, continuous monitoring and real-time alerts are two features that are …

read more

OpIsrael 2016 marked by increase in data compromise

April 8, 2016

In our last blog on OpIsrael, we assessed what we were likely to observe on April 7. Now, shortly days …

read more

OpIsrael: An Update

April 6, 2016

Last month our intelligence team published a blog on the use of ABI in understanding OpIsrael 2016, which suggested that …

read more

URGENT, ACT. RQD: Navigating Business Email Compromise

April 4, 2016

Call me phishmail. Whaling ­– also known as CEO fraud and business email compromise (BEC) – is a type of …

read more

Dark web: More than just a bastion of criminality

March 31, 2016

For many people, the term “dark web” refers to criminal activity on Internet. There are many definitions for what comprises …

read more

It’s time to put the diligence into your M&A due diligence

March 29, 2016

The headlines resulting from the Target/Fazio Mechanical Services and T-Mobile/Experian breaches have raised the awareness around third-party risks. Unfortunately, awareness …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive