Digital Footprint Monitoring

Gain an attackers-eye-view of your external-facing infrastructure.

  • Digital Footprint Monitoring

    Digital Footprint Monitoring

    Gain an attackers-eye-view of your external-facing infrastructure.

    Read Report
  • ×

    3 Reasons the Cybercriminal Forum is
    NOT Dead

    - Dec 17th -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 December Cybercriminal Forums Webinar
    Thank you!
    Error - something went wrong!
  • Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...

    Read Post
  • BlueKeep: Cutting through the hype to prepare your organization

    BlueKeep: Cutting through the hype to prepare your organization

    Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the

    Read Post
  • Blog | PowerShell Security Best Practices

    Blog | PowerShell Security Best Practices

    Threat actors have long since used legitimate tools to infiltrate and laterally move across defender’s networks. The reasons for this ...

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Breach! Exploring the Modern Digital Breach: Part 129:00

    Breach! Exploring the Modern Digital Breach: Part 1

    It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick

    Watch Video
  • Weekly Intelligence Summary 17 Oct - 24 Oct 2019

    Weekly Intelligence Summary 17 Oct - 24 Oct 2019

    In the spotlight this week: Russia-linked threat group “Turla” was reported to be using cyber-attack tools associated with Iran-linked threat group “APT34”, in conjunction with Turla’s own tools.

    Read Report
  • Avast Breach Attempt, NordVPN Breach, And Wifi Security Risks

    Avast Breach Attempt, NordVPN Breach, And Wifi Security Risks

    The team first looks at Avast, which encountered a cyber espionage attempt. Then NordVPN announced that a hacker had breached servers used by NordVPN. And finally Dr. Richard Gold put out a new blog t

    Read Post
  • Lessons Learned from Equifax Breach

    Lessons Learned from Equifax Breach

    What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.

    Read Report
  • GAO’s Equifax Post-mortem Report

    GAO’s Equifax Post-mortem Report

    It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. ...

    Read Post
  • Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of...

    Read Post
  • Blog | 2017 Equifax Breach: Impact and Lessons Learned

    Blog | 2017 Equifax Breach: Impact and Lessons Learned

    Equifax experienced a data breach that occurred in mid-May 2017, was first discovered on 29 Jul 2017, and was publicly ...

    Read Post
  • loading
    Loading More...