Our Blog
Check back for weekly updates
Geopolitical Monitoring Report | July 25, 2022
Europe & Eurasia | Canada/Germany/Russia Nord Stream 1: Canada to return repaired Russian pipeline part to Germany: DW Background: Canada announced that it will grant an exemption from its current sanctions on Russia to return a turbine for the Nord Stream...
A Sailing Trip Gone Awry
OSINT to the Rescue At Nisos, we are all about threat intelligence. We examine online sources to track threats to you and your business, and we provide meaningful analysis. We use OSINT, proprietary data, and paid data sources to attribute and correlate various...
15 Common Types of Business Fraud
Fraud is a constant thorn in the side of many enterprises. It affects not only their operations and their revenue. Fraud schemes compromise their employees and their customers. We have seen multiple versions of these fraudulent activities in our analyst-led threat...
5 Tips to Secure Your External Attack Surface
You know that cybersecurity is of the utmost importance for modern businesses, and as CISO, you do everything you can to keep things secure. From security controls and attack surface management tools, to vulnerability management and network security measures - you do...
What Are Bots and How Are They Used?
A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user needing to manually start them up every time. Bots often imitate or replace a human user's behavior...
Nisos Wins 2 Global Infosec Awards
The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most respected information security products and services. The awards, granted by Cyber Defense Magazine (CDM),...
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
An Investigative Report - May 2022 In March 2020, a hacktivist group called “Digital Revolution” claimed to have hacked a subcontractor to the FSB, the Federal Security Service of the Russian Federation. They claimed the hack occurred in April 2019. They...
Careful What You Wish For: The NewProfilePic App
Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app. “It really brings out the best in you!” they say. Then, one day, the buzz takes a turn - “You haven’t heard? The Newprofilepic app is Russian and sends...
Top 7 Digital Footprint Dangers for Executives
Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online. It's not just physical security threats. Slander, libel, impersonation, fraud, and disinformation targeted against...
What Is Threat Intelligence?
Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated, processed, analyzed, and used to assess...
Russia Isn’t the Only Nation State Threat Actor: Keep an Eye on These Three Nation States
The Russian aggression against Ukraine is no secret. It has certainly been getting a lot of airtime lately. Everybody seems to have written a blog or a white paper. Heck, even we did. In our recent blog, Russian Aggression and Its Potential Impact on the West, we...
Influencing the Narrative: Nisos Investigates an Inauthentic Xinjiang Twitter Network
An Investigative Report - April 2022 EXECUTIVE SUMMARY The Chinese Communist Party (CCP) has come under international scrutiny for the treatment of the Uyghur ethnic minority within Xinjiang. Nisos researchers discovered a coordinated inauthentic network...
How Do Cybercriminals Steal Credentials?
Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off on the black market. Finding out that your users’ credentials have been leaked is anxiety-producing, to say...
5 Signs You Need an Enterprise Cyber Fusion Center
The concept of a fusion center originated in response to the intelligence-sharing challenges of the war on terror. Typically state-owned and operated, a fusion center distributes threat-related information between state, local, tribal, federal, and private sector...
Why Physical Security and Cybersecurity Must Work Together
As more and more aspects of business move into the digital world, the internet provides many conveniences and opportunities to increase productivity. But there are vulnerabilities to consider. Most enterprises understand the importance of cybersecurity and physical...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.














