The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most…
Blog
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
In March 2020, a hacktivist group called “Digital Revolution” claimed to have hacked a subcontractor to the FSB, the Federal Security Service of the Russian Federation…
Careful What You Wish For: The NewProfilePic App
Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app…
Top 7 Digital Footprint Dangers for Executives
Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online…
What Is Threat Intelligence?
Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat…
Russia Isn’t the Only Nation State Threat Actor: Keep an Eye on These Three Nation States
The Russian aggression against Ukraine is no secret. It has certainly been getting a lot of airtime lately. Everybody seems to have written a blog or a white paper…
How Do Cybercriminals Steal Credentials?
Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off…
5 Signs You Need an Enterprise Cyber Fusion Center
The concept of a fusion center originated in response to the intelligence-sharing challenges of the war on terror. Typically state-owned and operated…
Why Physical Security and Cybersecurity Must Work Together
As more and more aspects of business move into the digital world, the internet provides many conveniences and opportunities to increase productivity…
Colombian Election Disinformation Campaign: The Role of Venezuelan Leftists
Nisos researchers have completed an investigative report on election influence related to the upcoming Colombian Presidential election…
Russian Aggression and Its Potential Impact on the West
History and current intelligence indicate Russia’s strategic objective is to install a puppet regime in Kyiv favoring Moscow…
Domain Abuse: What to Look For and Monitor
Let’s say that you have just signed up for a new subscription to a software program…
S&P Global and 451 Research Predict Continued M&A Acceleration in 2022
Mergers and acquisitions aren’t slowing down anytime soon. As M&A activities accelerate, early and comprehensive due diligence…
Nisos Wins 11 Cybersecurity Excellence Awards
The Cybersecurity Excellence Awards honor companies, services, and individuals that demonstrate excellence, innovation, and leadership…
Chinese Commercial Firm OneSight Conducts Disinformation Operations in Support of the Chinese State against Uyghurs
Nisos research revealed Chinese commercial marketing firm OneSight developed a sophisticated social media management and monitoring system…
Nisos Investigation Identifies Inauthentic Election Disinformation Campaign in Honduras
Nisos researchers identified a coordinated, inauthentic network of approximately 317 Twitter accounts that aim to influence…
What does “Outside the Firewall” Mean to Nisos
You have heard us say that Nisos is an expert at identifying risk and disrupting adversaries “outside the firewall.”…
What is a Selector in the World of Digital Crime?
BlogWhat is a Selector in the World of Digital Crime? Every hour of every day, criminals, nation states, and fraudsters around the world commit attacks using phone numbers, email addresses, and social media handles. We call these “selectors,” i.e. the technical...
How to Start an Intelligence Program or Choose a Managed Intelligence Provider – Part 1 – Technology
When it comes to Threat Intelligence, there are some misnomers we think should be clarified. Data is not information, and information is not intelligence…
Indonesian Disinformation Operators Stir China Tensions
Team Pandion™, the Nisos research team, recently discovered Indonesian disinformation actors pretending to be associated with U.S. military organizations…
What is Nisos® Managed Intelligence™
Intelligence delivers actionable information to drive a decision…
Digital Executive Protection: Your Physical Security is Gone, Now What?
Executive protection teams face the unenviable job of triaging daily threat posts coming from many directions, including social media, phone calls, emails, and even in person…
Decrypting WeChat Messages Without Physical Possession of a Mobile Device
A common problem in the world of digital forensics and insider threat investigations is that employees can use a third-party application, like WeChat…
Uyghur American Association Targeted with Lookalike Website
Nisos researchers identified a domain, UighurWorld[.]com, targeting the Uyghur American Association (UAA), which represents the Uyghur population in the United States…
In Democracy We Trust
In July 2020, enterprising PhD candidates and a Johns Hopkins professor began aggregating predictions of unrest in the United States into a site unsubtly titled…
Steps for External and Internal Threat Hunting in the Aftermath of SolarWinds
The holiday season is full of joy, anticipation, and the latest technology breach news. With this being 2020, the technology industry…
White Supremacist Movements Are Exploding
Violent white supremacist movements have been undergoing a strong resurgence since 2013. Does your company have eyes…
Actioning Cyber Threat Intelligence for Cloud-based Enterprise
Today, many companies are primarily cloud-based with little on-premise infrastructure. These organizations…
How to Successfully Implement a Threat Intelligence Program
BlogHow to Successfully Implement a Threat Intelligence Program Threats continue to occur on a global scale. They are large, they are complex, and they are growing. This problem has led to widespread interest in tailoring intelligence programs that provide insight...
Weaponization for Disinformation
Continuing our series on the adversarial mindset, we focus on how actors weaponize narratives for disinformation operations…
What is Coordinated Inauthentic Behavior?
Coordinated Inauthentic Behavior (CIB) is a common phrase heard in the news regarding disinformation, misinformation…
Weaponization for Cyber-Enabled Fraud
In our previous blog, we highlighted how fraudsters conduct reconnaissance for fraud activities…
Weaponizing Tools for Computer Network Operations
Continuing in our series on the adversarial mindset, we focus on weaponization for computer network operations…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.































