cyber threat intelligence

DRP glossary

Digital Risk Protection (DRP) Glossary

Digital Risk Protection (DRP) Glossary We are aware of the information overload and wealth of technical terms that may sometimes be confusing. To make it easier to understand industry terminology, we came up with some definitions of some of the … Read More

Firework Azure Sentinel

Firework integration with Azure Sentinel: Leveraging new SOAR capabilities

Firework integration with Azure Sentinel: Leveraging new SOAR capabilities For any modern cybersecurity team, gathering system logs in a centralized location is insufficient and only one step in the process. In order to keep up with the pace of incoming … Read More

Slilpp Users Scammed Following Darknet Market Takedown

Slilpp Users Scammed Following Darknet Market Takedown The US Department of Justice has taken down Slilpp, following an international collaboration between different law enforcement agencies. Slilpp emerged in 2012 and was one of the largest marketplaces for stolen credentials. According … Read More

media

Cancel Culture Reaches the Criminal Underground

Cancel Culture Reaches the Criminal Underground In our ransomware report from late 2020, we explained how some ransomware groups were offering their services to others. Ransomware-as-a-Service (RaaS) has become popular and generated much discussion on the criminal underground. It represents … Read More

best kept secret

0-Day No Longer Best Kept Secrets On The Internet

0-Day No Longer Best Kept Secrets On The Internet A 0-day is a software vulnerability that is unknown to its software maker. 0-days are perhaps the most valuable type of exploits out there simply because they can be used with … Read More

home office covid 19 threat

The Threat Landscape Post-COVID-19 and How You Can Address It

The Threat Landscape Post-COVID-19 and How You Can Address It The Covid-19 pandemic has changed not only our perspective on life and work, but also cybersecurity strategy worldwide. The past nearly two years have prompted a shift to digitalization and … Read More

noise reduction and prioritisation

Noise Reduction and Prioritisation: One Size Does Not Fit All

Noise Reduction and Prioritisation: One Size Does Not Fit All One man’s trash is another man’s treasure, what one considers undesirable is likely specific to the listener. Or, at least, that is the unwritten rule in several situations, one of … Read More

Malicious Actors Show Increased Interest in Information Theft

Malicious Actors Show Increased Interest in Information Theft The evolution of malicious actors over the last four decades has shown that greed is greatly responsible for most of the cybersecurity incidents we keep witnessing. While in the 1980s virus authors … Read More

dark web

Major Hack Jeopardizes Future of Dark Web Marketplaces

Major Hack Jeopardizes Future of Dark Web Marketplaces Over the past week, an unknown malicious actor launched perhaps the biggest phishing attack against dark web marketplaces. This attack created havoc among their participants, and further questioned the very business model … Read More

risks of token leaks

How to Mitigate the Risks of Token Leaks

How to Mitigate the Risks of Token Leaks Access tokens are used in token-based authentication and allow users to access a website, an application or API. After verifying their identity, the user has no need to re-enter their credentials for … Read More