All Posts

2.3 billion files exposed across online file storage technologies
May 30, 2019 read more

Communicating Intelligence: The Challenge of Consumption

December 10, 2015

In my previous blog in this series I discussed the challenge of effectively communicating intelligence, and provided examples of how …

read more

Communicating Intelligence: Getting the message out

December 8, 2015

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll …

read more

TalkTalk Information Likely to be Discoverable on The Dark Web

December 4, 2015

Last month, TalkTalk disclosed that they been the victim of a cyber attack on its website. Initial disclosures indicated that …

read more

Communicating Intelligence: A Battle of Three Sides

December 2, 2015

Good intelligence depends in large measure on clear, concise writing. -Fran Moore, Director for Analysis, Central Intelligence Agency (2011) I’m …

read more

Criminal Services – Counter Antivirus Services

November 30, 2015

Infosecurity Magazine recently reported that two individuals have been arrested in the UK on suspicion of running a website that …

read more

Activity Based Intelligence – Activating Your Interest?

November 25, 2015

Some threat actors love to make noise. Be it a tweet, a forum post, or a chat room message, communicating …

read more

Crackas With Attitude: What We’ve Learned

November 23, 2015

One of the most active actors of the past several months has been a hacktivist group who identify themselves as …

read more

From CTI to Cyber Situational Awareness: What You Should Know

November 16, 2015

With more attackers trailing the digital shadows of organizations, traditional defenses have proven to be insufficient and organizations are looking …

read more

The Way of Hacking

November 10, 2015

In the Japanese martial art of Aikido it is said that “Kurai Dori” is the ability of a skilled practitioner, …

read more

Emerging Markets: Online Extortion Matures via DDoS Attacks

November 9, 2015

Unlike scenes from books or movies where shadowy figures hold manila envelopes containing information or photographs pertaining to an unsuspecting …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive