Lessons From Clop: Combating Ransomware and Cyber Extortion Events

Lessons From Clop: Combating Ransomware and Cyber Extortion Events

Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber extortion strategy, from preparedness to detection and isolation The post Lessons From Clop: Combating Ransomware and Cyber Extortion ...
Protecting Your Organization’s Digital Identity: A Guide to Managed Attribution

Protecting Your Organization’s Digital Identity: A Guide to Managed Attribution

Managed attribution has become a powerful technique for organizations to gather intelligence and protect themselves from cyber threats. By using a variety of tools and techniques to conceal their activities, organizations can ...
Why Intelligence Teams Are Moving From In-House Virtual Machines to Flashpoint Managed Attribution

Why Intelligence Teams Are Moving From In-House Virtual Machines to Flashpoint Managed Attribution

Intelligence teams are ditching self-hosted VM labs and turning to Flashpoint's Managed Attribution– a flexible and fully managed virtual environment that frees up security teams to focus on their core missions. With ...
What VPNs and Incognito Mode Still Give Away in Your Online Identity

What VPNs and Incognito Mode Still Give Away in Your Online Identity

VPN and Incognito Mode reveal a ton of data to visited websites that managed attribution solutions can conceal, manipulate for analyst anonymity ...
Solving the Recurring Collection and Time Tradecraft Issues in Online Investigations

Solving the Recurring Collection and Time Tradecraft Issues in Online Investigations

Collector Add-On: Silo for Research enhances researcher workflows to automate recurring collection of data at appropriate times to avoid detection ...
From the Experts: Social Media Monitoring and Dark Web Investigations

From the Experts: Social Media Monitoring and Dark Web Investigations

Two cybersecurity veterans discuss why not just government agencies need to securely investigate threats via social media and the dark web ...

Secure Guardrails