cyber threat intelligence

Malicious Actors Show Increased Interest in Information Theft

Malicious Actors Show Increased Interest in Information Theft The evolution of malicious actors over the last four decades has shown that greed is greatly responsible for most of the cybersecurity incidents we keep witnessing. While in the 1980s virus authors … Read More

dark web

Major Hack Jeopardizes Future of Dark Web Marketplaces

Major Hack Jeopardizes Future of Dark Web Marketplaces Over the past week, an unknown malicious actor launched perhaps the biggest phishing attack against dark web marketplaces. This attack created havoc among their participants, and further questioned the very business model … Read More

risks of token leaks

How to Mitigate the Risks of Token Leaks

How to Mitigate the Risks of Token Leaks Access tokens are used in token-based authentication and allow users to access a website, an application or API. After verifying their identity, the user has no need to re-enter their credentials for … Read More

transmission-of-knowledge

Private forums increase transmission of knowledge by malicious actors

Private forums increase transmission of knowledge by malicious actors Malicious actors use online discussion forums to facilitate the exchange of knowledge, often out of the public’s eye. In this blog, we study the transmission of knowledge that takes place on … Read More

spam phpmailers

Business of Sending Spam

Business of Sending Spam While malicious actors have developed countless attack methods, spam remains to this day a significant threat vector for companies. The most recent statistics on spam are indicative of the danger that spam poses: 95% of all … Read More

leaky buckets CTI

Why your team should be concerned about leaky buckets on the internet

Why your team should be concerned about leaky buckets on the internet Since its inception in March 2006, AWS cloud storage option, also referred to as S3 (Simple Storage Service), has generated keen interest due to its low maintenance and … Read More

darknet war

All Is Fair In Darknet Wars

All Is Fair In Darknet Wars For anyone trying to collect data on the darknet, the last three years have been an incredible challenge. The dark net used to be a collection of simple marketplaces that could be easily indexed … Read More

shodan How We Evaluate Risk and Prioritize Alerts

Shodan: How We Evaluate Risk and Prioritize Alerts

Shodan: How We Evaluate Risk and Prioritize Alerts Monitoring open ports on Shodan can sound simple, but the reality is that there is a lot of data which regularly changes. Having yet another source that generates multiple alerts is not … Read More