The Race to Cyber Attribution Needs to Stop

The Race to Cyber Attribution Needs to Stop

By Emilio Iasiello, LookingGlass Cyber Threat Intelligence Group (CTIG) It has become almost ...

LookingGlass Unveils Next-Generation Threat Intelligence Management Platform

LookingGlass Cyber Solutions™, the leader in threat intelligence and dynamic threat defense, ...
weekly-intel-report

Weekly Threat Intelligence Brief: March 29, 2016

This weekly brief highlights the latest threat intelligence news to provide insight into the latest ...
weekly-phishing-report

Weekly Phishing Report: March 28, 2016

Phishing Report: Top Targets Week of March 20 – March 26, 2016 In this week’s phishing report, ...
Data Leak

Doxing: An Increasingly Popular Form of Online Harassment

by Marc Larson and Olga Polishchuk Recently, a hacker released the personal information of 29,000 ...
weekly-phishing-report

Weekly Phishing Report: March 21, 2016

Phishing Report: Top Targets Week of March 13 – March 19, 2016 In this week’s phishing report, ...
Data Leak

Widespread Malspam Campaign Delivering Locky Ransomware

By Steven Weinstein The LookingGlass Cyber Threat Intelligence Group (CTIG) observed a widespread ...
White Paper: Advanced Threat Intelligence-Driven Security

Advanced Threat Intelligence-Driven Security

Enterprise risk and security operations are seeking a tighter coupling and more automated and ...
India Looks to Establish Itself as an Influential Geopolitical Voice in Cyberspace

India Looks to Establish Itself as an Influential Geopolitical Voice in Cyberspace

As leading global powers seek to have a hand in influencing Internet governance, India is slowly ...
Using Global Threat Intelligence to Improve Security Analysis Inside the Perimeter

CTO Perspectives, Part IV: Using Global Threat Intelligence to Improve Security Analysis Inside the Perimeter

  By Allan Thomson, LookingGlass Chief Technology Officer In the last few weeks I wrote a ...