Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data, systems or network access, their attack surface poses a threat to your data. Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.

Threat Intel Fan?
Sign up below to get our TI updates delivered to your inbox!
Other content in this Stream

ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover: * Recent advances in cyber threat intelligence and end-point protection have...

After a tumultuous few months at the start of the year in which each week seemed to bring a major ...

Today, the leaders of the North Atlantic Treaty Organization (NATO) are gathering in Madrid, Spain for their annual Summit, where ...

Picture this, you are an analyst working in a large security operations center (SOC) responding to an overwhelming amount of ...

In a few previous blogs, we’ve covered how threat actors discuss prison on Russian-language cybercriminal platforms. We’ve touched on high-profile ...

In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...

There is a saying derived from Western movies that say whoever draws first, loses the duel. Nick Bohr, a famous ...

Where is the year going? It only seems like yesterday that we celebrated the turn of the year, with the ...

Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...

It has been five years since the dumpster fire we all remember as WannaCry. WannaCry is self-propagating ransomware that held ...

ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover: * REvil ransomware returns with new malware * Moshen Dragon targeting...

In late 2021, we observed a new ransomware operation named “ALPHV” (also known as BlackCat) emerge. The group operates as ...

For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...

The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...

As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of ...

This blog is the second part of our Data Analysis in Threat Intelligence series, where we focus on the tools ...

As an intelligence analyst, it’s paramount to stay on top of what’s happening in the world around you. To inform ...

You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover: * 'RaidForums' has been shut down and seized * SandWorm targets electrical substations in...

In the first quarter of 2022, several high-severity vulnerabilities were targeted by threat actors to facilitate malicious campaigns. The first ...