All Posts

Show
SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks
July 23, 2019 read more

Communicating Intelligence: Getting the message out

December 8, 2015

In my previous blog I discussed some of the challenges associated with communicating intelligence. In this follow up piece, I’ll …

read more

TalkTalk Information Likely to be Discoverable on The Dark Web

December 4, 2015

Last month, TalkTalk disclosed that they been the victim of a cyber attack on its website. Initial disclosures indicated that …

read more

Communicating Intelligence: A Battle of Three Sides

December 2, 2015

Good intelligence depends in large measure on clear, concise writing. -Fran Moore, Director for Analysis, Central Intelligence Agency (2011) I’m …

read more

Criminal Services – Counter Antivirus Services

November 30, 2015

Infosecurity Magazine recently reported that two individuals have been arrested in the UK on suspicion of running a website that …

read more

Activity Based Intelligence – Activating Your Interest?

November 25, 2015

Some threat actors love to make noise. Be it a tweet, a forum post, or a chat room message, communicating …

read more

Crackas With Attitude: What We’ve Learned

November 23, 2015

One of the most active actors of the past several months has been a hacktivist group who identify themselves as …

read more

The Way of Hacking

November 10, 2015

In the Japanese martial art of Aikido it is said that “Kurai Dori” is the ability of a skilled practitioner, …

read more

Emerging Markets: Online Extortion Matures via DDoS Attacks

November 9, 2015

Unlike scenes from books or movies where shadowy figures hold manila envelopes containing information or photographs pertaining to an unsuspecting …

read more

Crackas With Attitude strike again?

October 28, 2015

Last week, the New York Post reported that hackers had compromised the personal email address of CIA Director, John Brennan. …

read more

TalkTalk: Avoiding The Hype

October 28, 2015

There has been no shortage of media coverage on the recent TalkTalk cyber attack.  The full implications of the attack …

read more