
Best of 2023: Diamond Model of Intrusion Analysis: A Quick Guide
Any intrusion into a network calls for a thorough analysis to give security teams cyber intelligence about different threats and to help thwart similar future attacks. However, effective incident analysis has long been held back by uncertainty and high false positive rates in intrusion detection systems that lead to slow ... Read More
Best of 2023: Combo Lists & the Dark Web: Understanding Leaked Credentials
In today’s interconnected, cloud-based world, user credentials are the keys that grant entry to the house that stores an organization’s digital treasure. Just as burglars pick the lock on a physical house, cybercriminals use stolen credentials to gain unauthorized access to a company’s systems and networks. Similarly, cybercriminals can purchase ... Read More

Best of 2023: Top Russian Cybercrime Forums in 2023
Cybercrime forums provide an outlet for threat actors to coordinate, exchange information, and conduct illicit trades. Often hosted on the dark web (but sometimes accessible via the clear web), these forums are hubs of malicious activity. The typical structure of a cybercrime forum sees a dedicated marketplace section that facilitates ... Read More

Threat Spotlight: Generative AI
Two converging trends are on the precipice of reshaping the cyber threat landscape dramatically. The world is in the midst of a technological revolution that looks likely to cause significant and disruptive changes to society. Generative AI applications are poised to revolutionize the way we work, learn, and interact with ... Read More
Automating Your Red Team Approach: A Quick Guide
Your organization may be prepared for an attack. You may have all the recommended security controls and your employees may be well-trained when it comes to avoiding social engineering attacks. You cannot truly be prepared, however, until you test your defenses. Traditionally, this is done by bringing in experts to ... Read More
Domain Hijacking: The Definitive Guide to Detection & Remediation
Today, your company website is a critical part of your business. From marketing to sales, you use your website to support your business objectives. In many cases, companies incorporate portals that deliver digital customer experiences, including online purchasing and communications. As a customer-facing reflection of your corporate brand, you focus ... Read More
Business Email Compromise: 3 Steps to Reduce Risk
Email has been a popular delivery of malware and risk for decades.The first phishing schemes took place in the 1990s, and phishing techniques have only become more sophisticated in the decades since. It’s particularly popular among criminals now; since 2019, the use of phishing scams has increased by 300%. The ... Read More

Threat Actor TTPs & Cyber Threat Intelligence
Intelligence-driven cybersecurity is proactive. And proactive cybersecurity drives better defenses by improving the ability to anticipate threats, increase situational awareness, and reduce attack surfaces. Today’s cyber threat landscape sees more complex and diverse threats than ever. Delving into the tactics, techniques, and procedures (TTPs) that adversaries use is a valuable ... Read More

Geopolitical Intelligence: The Definitive Guide
Geopolitics and cybersecurity for organizations of all kinds are increasingly linked. This has become increasingly clear in the past year with Russia’s invasion of Ukraine, which has been called the world’s first hybrid war — attacks have taken place both on the ground and online. As Russia’s threat actors target ... Read More

Threat Actors: The Definitive 2023 Guide to Cybercriminals
In a digital world, companies collect more data and more types of data than ever before. As people use more technology, they generate new types of sensitive data. While data protection laws and compliance frameworks often detail categories of information requiring enhanced protection, they fail to keep pace with technological ... Read More