All Posts

Show
The Ecosystem of Phishing: From Minnows to Marlins
February 20, 2020 read more

Getting Strategic With Your Threat Intelligence Program

April 26, 2016

Tactical feeds have dominated the threat intelligence narrative for many years, but there is an emerging understanding that there must …

read more

Roboanalyst: The Future of Threat Intelligence?

April 25, 2016

Artificial Intelligence (AI) is currently going through one of its regular hype bubbles. Another dawn of the super-intelligent machine is …

read more

The Hacking Team breach – an attacker’s point of view

April 22, 2016

On 17 April 2016, two posts were added to Pastebin (one in Spanish, the other in English) detailing the alleged …

read more

OpIsrael: An Update

April 6, 2016

Last month our intelligence team published a blog on the use of ABI in understanding OpIsrael 2016, which suggested that …

read more

URGENT, ACT. RQD: Navigating Business Email Compromise

April 4, 2016

Call me phishmail. Whaling ­– also known as CEO fraud and business email compromise (BEC) – is a type of …

read more

Dark web: More than just a bastion of criminality

March 31, 2016

For many people, the term “dark web” refers to criminal activity on Internet. There are many definitions for what comprises …

read more

It’s time to put the diligence into your M&A due diligence

March 29, 2016

The headlines resulting from the Target/Fazio Mechanical Services and T-Mobile/Experian breaches have raised the awareness around third-party risks. Unfortunately, awareness …

read more

Cybersecurity for the nuclear industry – ‘in service modification’ or more systemic change required?

March 29, 2016

On the March 15, I was lucky enough to be invited to a round table event at Chatham House in …

read more

Online credit card shops – a numbers game

March 21, 2016

You may have recently read headlines about an online shop that was selling millions of stolen credit cards. Questions were …

read more

Antifragile Security: Bouncing Back Stronger

March 21, 2016

Strong, robust, stable, resilience – these are all words associated with a successful security posture. They’re comforting words that serve …

read more