Cyber Counterintelligence: When Defense Alone is No Longer Sufficient
“The best defense is good offense” is a saying that can be applied to many fields: military, games, business… and cybersecurity. However, the standard ‘defense-only’ approach many organizations have been taking is simply not sufficient for dealing with the current threat landscape. And just as intelligence services keep an eye on terrorists to stop them before they attack, organizations should move towards adopting the offensive approach to protect their infrastructure and systems.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
Cyber Crime Investigation Tools and Techniques Explained
Investigating a crime scene is not an easy job. It requires years of study to learn how to deal with hard cases, and most importantly, get those cases resolved. This applies not only to real-world crime scenes, but also to those in the digital world.
Cyber Threat Intelligence
We are living in the age of data. The explosive data growth we are experiencing shows no signs of stopping, as reports show that the size of total worldwide data will grow to 163ZB in next 10 years.
Top 10 Cyber Attack Maps for Visualizing Digital Threat Incidents
A new study by Bromium shows that digital crime revenue has grown to $1.5 trillion dollars annually in illicit profits. Popular websites including GitHub, EA and many others face bigger, more sophisticated attacks every day, falling victim to the growing trend of cybercrime.
OpSec: A Vital Part of Any Cybersecurity Program
We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind.
Data Intelligence: What is it and why is it so important?
The process of digital transformation has brought us many new developments, and more businesses are becoming data-driven as they are not only able to monetize that data directly, but can also utilize it for future decision-making.
SurfaceBrowser: a Passive Intelligence Tool for Exploring the Surface of Any Company
A few weeks ago we launched our new IP, Domain and Company Enrichment Feeds, and today we’re excited to show you one of the most robust information gathering utilities available on the Internet.
Top CVE’s exploited in the wild
In previous posts, we’ve explored ways to avoid security issues by hardening DNS servers, and also by following best SSH Security practices. However, today we are not going to show you how to protect against attacks. Instead, we will show you the top 10 most dangerous vulnerabilities exploited in the wild during the current year.
What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the best OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.