The Cybersecurity Excellence Awards honor companies, services, and individuals that demonstrate excellence, innovation, and leadership…
Blog
Chinese Commercial Firm OneSight Conducts Disinformation Operations in Support of the Chinese State against Uyghurs
Nisos research revealed Chinese commercial marketing firm OneSight developed a sophisticated social media management and monitoring system…
Nisos Investigation Identifies Inauthentic Election Disinformation Campaign in Honduras
Nisos researchers identified a coordinated, inauthentic network of approximately 317 Twitter accounts that aim to influence…
What does “Outside the Firewall” Mean to Nisos
You have heard us say that Nisos is an expert at identifying risk and disrupting adversaries “outside the firewall.”…
What is a Selector in the World of Digital Crime?
BlogWhat is a Selector in the World of Digital Crime? Every hour of every day, criminals, nation states, and fraudsters around the world commit attacks using phone numbers, email addresses, and social media handles. We call these “selectors,” i.e. the technical...
How to Start an Intelligence Program or Choose a Managed Intelligence Provider – Part 1 – Technology
When it comes to Threat Intelligence, there are some misnomers we think should be clarified. Data is not information, and information is not intelligence…
Indonesian Disinformation Operators Stir China Tensions
Team Pandion™, the Nisos research team, recently discovered Indonesian disinformation actors pretending to be associated with U.S. military organizations…
What is Nisos® Managed Intelligence™
Intelligence delivers actionable information to drive a decision…
Digital Executive Protection: Your Physical Security is Gone, Now What?
Executive protection teams face the unenviable job of triaging daily threat posts coming from many directions, including social media, phone calls, emails, and even in person…
Decrypting WeChat Messages Without Physical Possession of a Mobile Device
A common problem in the world of digital forensics and insider threat investigations is that employees can use a third-party application, like WeChat…
Uyghur American Association Targeted with Lookalike Website
Nisos researchers identified a domain, UighurWorld[.]com, targeting the Uyghur American Association (UAA), which represents the Uyghur population in the United States…
In Democracy We Trust
In July 2020, enterprising PhD candidates and a Johns Hopkins professor began aggregating predictions of unrest in the United States into a site unsubtly titled…
Steps for External and Internal Threat Hunting in the Aftermath of SolarWinds
The holiday season is full of joy, anticipation, and the latest technology breach news. With this being 2020, the technology industry…
White Supremacist Movements Are Exploding
Violent white supremacist movements have been undergoing a strong resurgence since 2013. Does your company have eyes…
Actioning Cyber Threat Intelligence for Cloud-based Enterprise
Today, many companies are primarily cloud-based with little on-premise infrastructure. These organizations…
How to Successfully Implement a Threat Intelligence Program
BlogHow to Successfully Implement a Threat Intelligence Program Threats continue to occur on a global scale. They are large, they are complex, and they are growing. This problem has led to widespread interest in tailoring intelligence programs that provide insight...
Weaponization for Disinformation
Continuing our series on the adversarial mindset, we focus on how actors weaponize narratives for disinformation operations…
What is Coordinated Inauthentic Behavior?
Coordinated Inauthentic Behavior (CIB) is a common phrase heard in the news regarding disinformation, misinformation…
Weaponization for Cyber-Enabled Fraud
In our previous blog, we highlighted how fraudsters conduct reconnaissance for fraud activities…
Weaponizing Tools for Computer Network Operations
Continuing in our series on the adversarial mindset, we focus on weaponization for computer network operations…
How Adversaries Conduct Reconnaissance for Disinformation Operations
Building on our series exploring the adversarial mindset, disinformation actors seek amplification of their content, regardless of whether…
An Introduction to Honeypots
In our latest blog series, we discuss how threat intelligence can be applied smarter for medium sized organizations with limited resources…
Using Selectors For Open Source Intelligence
BlogUsing Selectors For Open Source Intelligence A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical...
Making Threat Intelligence Useful for Medium-Sized Enterprises
BlogMaking Threat Intelligence Useful for Medium-Sized Enterprises Medium-sized enterprises that don’t have sophisticated security operations teams typically focus on the basic blocking and tackling of information security: policies around financial controls, incident...
How Adversaries Conduct Reconnaissance For Computer Network Operations
BlogHow Adversaries Conduct Reconnaissance For Computer Network Operations The adversarial mindset is the core that allows us to provide a world-class intelligence capability tailored to the needs of business. Many people ask what it means to have the adversarial...
Six Considerations for Building a Cyber Threat Intelligence Program
BlogSix Considerations for Building a Cyber Threat Intelligence Program When evaluating cyber threat intelligence programs for enterprise, organizations should consider six critical topics before spending on data. It’s natural for an organization to start from one of...
The Myth of Complex Passwords
BlogThe Myth of Complex Passwords Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more...
Three Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security
BlogThree Steps to Use Threat Intelligence, Red Team, and Blue Team Collaboration to Improve Security For many medium and large organizations, a penetration test that results in a “data breach” is going to lead to numerous findings that take months and sometimes years...
Avoiding Ransomware
BlogAvoiding Ransomware Many maturing security operations centers within medium and large enterprises will indicate that ransomware is often the biggest “threat” that keeps them up at night. Ransomware is not a threat; it is a capability criminals use with an intent...
Podcast Platitudes
BlogPodcast Platitudes Cybersecurity is an ever-evolving industry tackling some really challenging problems. Here at Nisos we truly feel that it is necessary to learn from the best at every opportunity, and we try to ensure that all of the material we present makes...
What Is Digital Identity Reduction and Why Does It Matter?
BlogWhat Is Digital Identity Reduction and Why Does It Matter? The amount of information openly available on the internet about any given individual is staggering.More and more, privacy and online security are brought into the limelight and people are becoming more...
Four Future Trends of Disinformation Campaigns
BlogFour Future Trends of Disinformation Campaigns While disinformation has played a powerful role in the geopolitical world over the last four years, enterprise is increasingly needing to be prepared to address numerous types of disinformation as well. Much of the...
Three Ways to Improve Return on Investment for Threat Intelligence
BlogThree Ways to Improve Return on Investment for Threat Intelligence If a corporate threat intelligence program is merely focusing on indicators of compromise delivered to a security operations function, they should consider expanding their reach throughout the...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.