Our Blog
Check back for weekly updates
Geopolitical Monitoring Report | July 28, 2022
The deal agreed upon by the energy ministers of European Union member states will result in members voluntarily reducing their natural gas consumption by 15 percent amid Russia’s continuing shipment cuts to the continent…
Geopolitical Monitoring Report | July 25, 2022
Canada announced that it will grant an exemption from its current sanctions on Russia to return a turbine for the Nord Stream I pipeline that it repaired…
A Sailing Trip Gone Awry
At Nisos, we are all about threat intelligence. We examine online sources to track threats to you and your business, and we provide meaningful analysis…
5 Tips to Secure Your External Attack Surface
You know that cybersecurity is of the utmost importance for modern businesses, and as CISO, you do everything you can to keep things secure…
What Are Bots and How Are They Used?
A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user…
Nisos Wins 2 Global Infosec Awards
The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most…
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
In March 2020, a hacktivist group called “Digital Revolution” claimed to have hacked a subcontractor to the FSB, the Federal Security Service of the Russian Federation…
Careful What You Wish For: The NewProfilePic App
Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app…
Top 7 Digital Footprint Dangers for Executives
Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online…
What Is Threat Intelligence?
Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat…
Russia Isn’t the Only Nation State Threat Actor: Keep an Eye on These Three Nation States
The Russian aggression against Ukraine is no secret. It has certainly been getting a lot of airtime lately. Everybody seems to have written a blog or a white paper…
Influencing the Narrative: Nisos Investigates an Inauthentic Xinjiang Twitter Network
The Chinese Communist Party (CCP) has come under international scrutiny for the treatment of the Uyghur ethnic minority within Xinjiang…
How Do Cybercriminals Steal Credentials?
Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off…
5 Signs You Need an Enterprise Cyber Fusion Center
The concept of a fusion center originated in response to the intelligence-sharing challenges of the war on terror. Typically state-owned and operated…
Why Physical Security and Cybersecurity Must Work Together
As more and more aspects of business move into the digital world, the internet provides many conveniences and opportunities to increase productivity…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.