Our Blog
Check back for weekly updates
Chinese Commercial Firm OneSight Conducts Disinformation Operations in Support of the Chinese State against Uyghurs
Nisos research revealed Chinese commercial marketing firm OneSight developed a sophisticated social media management and monitoring system…
Nisos Investigation Identifies Inauthentic Election Disinformation Campaign in Honduras
Nisos researchers identified a coordinated, inauthentic network of approximately 317 Twitter accounts that aim to influence…
What does “Outside the Firewall” Mean to Nisos
You have heard us say that Nisos is an expert at identifying risk and disrupting adversaries “outside the firewall.”…
What is a Selector in the World of Digital Crime?
BlogWhat is a Selector in the World of Digital Crime? Every hour of every day, criminals, nation states, and fraudsters around the world commit attacks using phone numbers, email addresses, and social media handles. We call these “selectors,” i.e. the technical...
How to Start an Intelligence Program or Choose a Managed Intelligence Provider – Part 1 – Technology
When it comes to Threat Intelligence, there are some misnomers we think should be clarified. Data is not information, and information is not intelligence…
Indonesian Disinformation Operators Stir China Tensions
Team Pandion™, the Nisos research team, recently discovered Indonesian disinformation actors pretending to be associated with U.S. military organizations…
What is Nisos® Managed Intelligence™
Intelligence delivers actionable information to drive a decision…
Digital Executive Protection: Your Physical Security is Gone, Now What?
Executive protection teams face the unenviable job of triaging daily threat posts coming from many directions, including social media, phone calls, emails, and even in person…
Decrypting WeChat Messages Without Physical Possession of a Mobile Device
A common problem in the world of digital forensics and insider threat investigations is that employees can use a third-party application, like WeChat…
Uyghur American Association Targeted with Lookalike Website
Nisos researchers identified a domain, UighurWorld[.]com, targeting the Uyghur American Association (UAA), which represents the Uyghur population in the United States…
In Democracy We Trust
In July 2020, enterprising PhD candidates and a Johns Hopkins professor began aggregating predictions of unrest in the United States into a site unsubtly titled…
Steps for External and Internal Threat Hunting in the Aftermath of SolarWinds
The holiday season is full of joy, anticipation, and the latest technology breach news. With this being 2020, the technology industry…
White Supremacist Movements Are Exploding
Violent white supremacist movements have been undergoing a strong resurgence since 2013. Does your company have eyes…
Actioning Cyber Threat Intelligence for Cloud-based Enterprise
Today, many companies are primarily cloud-based with little on-premise infrastructure. These organizations…
How to Successfully Implement a Threat Intelligence Program
BlogHow to Successfully Implement a Threat Intelligence Program Threats continue to occur on a global scale. They are large, they are complex, and they are growing. This problem has led to widespread interest in tailoring intelligence programs that provide insight...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.