Digital Risk Protection (DRP) Glossary We are aware of the information overload and wealth of technical terms that may sometimes be confusing. To make it easier to understand industry terminology, we came up with some definitions of some of the … Read More
cyber threat intelligence
Firework integration with Azure Sentinel: Leveraging new SOAR capabilities
Firework integration with Azure Sentinel: Leveraging new SOAR capabilities For any modern cybersecurity team, gathering system logs in a centralized location is insufficient and only one step in the process. In order to keep up with the pace of incoming … Read More
Slilpp Users Scammed Following Darknet Market Takedown
Slilpp Users Scammed Following Darknet Market Takedown The US Department of Justice has taken down Slilpp, following an international collaboration between different law enforcement agencies. Slilpp emerged in 2012 and was one of the largest marketplaces for stolen credentials. According … Read More
Cancel Culture Reaches the Criminal Underground
Cancel Culture Reaches the Criminal Underground In our ransomware report from late 2020, we explained how some ransomware groups were offering their services to others. Ransomware-as-a-Service (RaaS) has become popular and generated much discussion on the criminal underground. It represents … Read More
0-Day No Longer Best Kept Secrets On The Internet
0-Day No Longer Best Kept Secrets On The Internet A 0-day is a software vulnerability that is unknown to its software maker. 0-days are perhaps the most valuable type of exploits out there simply because they can be used with … Read More
The Threat Landscape Post-COVID-19 and How You Can Address It
The Threat Landscape Post-COVID-19 and How You Can Address It The Covid-19 pandemic has changed not only our perspective on life and work, but also cybersecurity strategy worldwide. The past nearly two years have prompted a shift to digitalization and … Read More
Noise Reduction and Prioritisation: One Size Does Not Fit All
Noise Reduction and Prioritisation: One Size Does Not Fit All One man’s trash is another man’s treasure, what one considers undesirable is likely specific to the listener. Or, at least, that is the unwritten rule in several situations, one of … Read More
Malicious Actors Show Increased Interest in Information Theft
Malicious Actors Show Increased Interest in Information Theft The evolution of malicious actors over the last four decades has shown that greed is greatly responsible for most of the cybersecurity incidents we keep witnessing. While in the 1980s virus authors … Read More
Major Hack Jeopardizes Future of Dark Web Marketplaces
Major Hack Jeopardizes Future of Dark Web Marketplaces Over the past week, an unknown malicious actor launched perhaps the biggest phishing attack against dark web marketplaces. This attack created havoc among their participants, and further questioned the very business model … Read More
How to Mitigate the Risks of Token Leaks
How to Mitigate the Risks of Token Leaks Access tokens are used in token-based authentication and allow users to access a website, an application or API. After verifying their identity, the user has no need to re-enter their credentials for … Read More