Introduction to Spectre Several threat groups and actors exist in online cybercrime communities with the express goal of hacktivism, which is defined as the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda...
Research Articles
Cybercrime group on a data leakage tear through U.S. States
Data Leaks Escalate As Data Leaks continue to mount online this year, dealing massive impacts to the companies and governments they are stolen from, hackers have become increasingly public about their activities and continue to act with impunity in the cybercrime...
April Showers Bring May Data Leaks
You know what they say - April showers bring May Data Leaks. They do say that, right? Regardless, there was a flood of data leaks in May of this year. The last 3 years have seen a trend of data leakage incidents rising rapidly. The broad consensus is that this can be...
Call the Plumber: Your Documents are Leaking
For most organizations, posting brochures, contract templates, whitepapers, and various forms of marketing collateral online is a standard practice. And for most cyber criminals, this can surreptitiously provide a wealth of information about the organization they are...
How to perform a third party risk assessment – for mostly free! Part 2 of 3
Part 2: Passive techniques that require no* permission. *The author of this post is not a lawyer and makes no guarantees nor indemnifications regarding the content contained herein. Part 1 of this series—How to perform a third party risk assessment – for mostly...
How to perform a third party risk assessment – for mostly free! Part 1 of 3
Part 1: Mindset, Risk Mapping, and Assessment Techniques. With a meteoric rise in successful supply chain attacks, many organizations have been scrambling to find solutions. Now more than ever, it is critical for organizations to effectively assess and monitor third...