Our Blog

Check back for weekly updates

Weaponization for Disinformation

Weaponization for Disinformation

Continuing our series on the adversarial mindset, we focus on how actors weaponize narratives for disinformation operations. In a previous blog post, we wrote about the reconnaissance steps that disinformation actors take prior to launching their operations, including...

read more
What is Coordinated Inauthentic Behavior?

What is Coordinated Inauthentic Behavior?

Coordinated Inauthentic Behavior (CIB) is a common phrase heard in the news regarding disinformation, misinformation, and influence operations; but what exactly does it mean?First, let’s define our terms: inauthentic behavior, and coordinated. Inauthentic behavior in...

read more
Weaponization for Cyber-Enabled Fraud

Weaponization for Cyber-Enabled Fraud

In our previous blog, we highlighted how fraudsters conduct reconnaissance for fraud activities. While banking malware, trojans, worms, and botnets such as Zeus Panda, Ramnit and Trickbot have typically been used to infect consumer PCs in order to collect personal...

read more
Weaponizing Tools for Computer Network Operations

Weaponizing Tools for Computer Network Operations

Continuing in our series on the adversarial mindset, we focus on weaponization for computer network operations. Following the reconnaissance phase and identifying a target, an actor needs to gain a foothold in a network before determining how to monetize the access or...

read more
An Introduction to Honeypots

An Introduction to Honeypots

In our latest blog series, we discuss how threat intelligence can be applied smarter for medium sized organizations with limited resources. We discuss ways to proactively detect threats beyond subscribing to information feeds that require a lot of resources to...

read more
Using Selectors For Open Source Intelligence

Using Selectors For Open Source Intelligence

A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical blog defining a selector, we will be diving deeper...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.