threat-intelligence-insights

Three Ways Criminals Are Using Social Media: Phishing, Malware, and Physical Threats

In our previous post, we discussed some of the reasons why criminals like social media. In this ...
threat-intelligence-insights

LinkedIn’s New App Introduces Broad Range of Security, Compliance Risks

In an ambitious attempt to further integrate its services into the lives of business professionals, ...
threat-intelligence-insights

Nothing New Under the Sun: Hacktivists Exploited Tried and True Methods to Compromise Media Websites

A wise man once said, "There is there is nothing new under the sun." This has been proven true ...
threat-intelligence-insights

“Obamacare” Affordable Care Act Offers Opportunity for Identity Theft, Phishing

The Affordable Care Act ("ACA"), often referred to as Obamacare, is ostensibly designed to make it ...
threat-intelligence-insights

RSA Token Vulnerability and One of America’s Most Secret Agencies Invoked in Latest Spear Phishing Attack

A targeted scam or “Spear Phishing” attack making the rounds today invokes the National ...
threat-intelligence-insights

A Five-Point Plan for Social Network Usage

If there’s any message you should take away about utilizing social media in a secure manner, it ...
threat-intelligence-insights

Don’t Let the Social Media “Generation Gap” Expose Your Network

Here’s a true story I like to tell to explain how wide the social media “generation gap” is. ...
threat-intelligence-insights

For Modern-Day Hackers, Data Delivers the Big Payday

In a previous blog, our CTO, Manoj Srivastava, discussed how the methodology of modern cyber crooks ...
threat-intelligence-insights

System Compromised? It’s Likely Due to a Matter of (Misplaced) Trust

As the CTO of a leading cyber-intelligence company, I’m often asked about the biggest ...
threat-intelligence-insights

Hacked WordPress Sites: An Open Letter to WordPress Developers

The content management system WordPress is a fantastic tool. Its ease of use has has helped it ...