OSINT Feed: The Missing Piece in the SOC Puzzle

OSINT Feed: The Missing Piece in the SOC Puzzle

The next-generation SOC is right around the corner. Learn why an OSINT feed is the critical piece that’s missing.

How Can Monitoring the Dark Web Help Protect against Zero Day Attacks?

How Can Monitoring the Dark Web Help Protect against Zero Day Attacks?

Are companies looking in the right places to find zero day threats? Here’s how monitoring the dark web can help protect against these threats.

All You Need to Know about IOC Monitoring on the Dark Web

All You Need to Know about IOC Monitoring on the Dark Web

Cybersecurity teams are now turning to the dark web for Indicators of Compromise.

How Can Monitoring the Dark Web Help Prevent the Next Cyber Attack?

How Can Monitoring the Dark Web Help Prevent the Next Cyber Attack?

With cyber attacks constantly being on the rise, monitoring the dark web is no longer just an option.

Flagstar Bank Breach: Could Employee Credentials Have Let the Hackers in?

Flagstar Bank Breach: Could Employee Credentials Have Let the Hackers in?

The Flagstar bank breach is said to affected around 1.5 million customers, leading to a class action lawsuit.

Exclusive: Leaked Employee Accounts Traded ahead of Portland’s Biggest Theft

Exclusive: Leaked Employee Accounts Traded ahead of Portland’s Biggest Theft

Discover what the City of Portland should’ve seen before it suffered its biggest theft to date.

What Should GitHub Supply Chain Attack Teach Us?

What Should GitHub Supply Chain Attack Teach Us?

From a suspicious chat in a Telegram hacking group to mentions of their third parties, here’s what we found.

Revealed: Malicious Insider Threats on the Dark Web

Revealed: Malicious Insider Threats on the Dark Web

While companies take measures to protect their business, they often ignore the threat within. Here’s what you can find on malicious insiders on the dark web.

All About Business Email Compromise (BEC) in the Dark Web

All About Business Email Compromise (BEC) in the Dark Web

In 2021, Business Email Compromise (BEC) produced a loss of $2.7B, ranked above ransomware attacks and cryptocurrency theft. Here’s all you need to know about BEC scams.

Supply Chain Risk: Lessons To Learn from Hubspot’s Breach

Supply Chain Risk: Lessons To Learn from Hubspot’s Breach

Dozens of Hubspot customers were compromised. But this attack shouldn’t have been a surprise. Read to learn why.