Blog

Cyber Threat Intelligence – We Wrote the Book

Cyber Threat Intelligence – We Wrote the Book

The Definitive Guide to Cyber Threat Intelligence…A Book that Needed to be Written At iSIGHT Partners we pride ourselves in the fact that we are pioneers in the area of cyber threat intelligence. We’ve been leading the way in this market for 8 years now and we intend to continue. […]

Continue Reading

 

ThreatScape Media Highlights Update – Week Of May 20th

ThreatScape Media Highlights Update – Week Of May 20th

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily. LOGIN SYSTEM SUPPLIES FAKE PASSWORDS TO HACKERS FROM THE MEDIA Researchers developed a system that will […]

Continue Reading

 

ThreatScape Media Highlights Update – Week Of May 13th

ThreatScape Media Highlights Update – Week Of May 13th

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily. ANONYMOUS-TIED DDoS BOTNET SHOWS INSECURE ROUTERS ARE LEGION FROM THE MEDIA Tens of thousands of home […]

Continue Reading

 

Bublik Trojan – Variant Evolves with New Features

Bublik Trojan – Variant Evolves with New Features

Active Development Underway for Bublik iSIGHT Partners has been tracking the development of the Bublik downloader trojan and recently discovered a new variant with more complex features. Based on what we have seen, it appears to use spam and the Nuclear Exploit Kit as a method of distribution. Downloader Trojans […]

Continue Reading

 

Threat Clarity through iSIGHT Partners Threat Diagnostics: Recent Campaign Discoveries

By

May 12, 2015

iSIGHT Partners

Threat Clarity through iSIGHT Partners Threat Diagnostics: Recent Campaign Discoveries

Pentests only show you gaps in your network – Threat Diagnostics show you what is being targeted, by who and why…   iSIGHT Partners’ Threat Intelligence Services team assists organizational efforts to build, mature and sustain intelligence led security strategies. Part of that mission involves assisting various roles within those […]

Continue Reading

 

ThreatScape Media Highlights Update – Week Of May 6th

ThreatScape Media Highlights Update – Week Of May 6th

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily. SALLY BEAUTY INVESTIGATES POSSIBLE SECOND CARD BREACH FROM THE MEDIA Just over a year after it […]

Continue Reading

 

ThreatScape Media Highlights Update – Week Of April 29th

ThreatScape Media Highlights Update – Week Of April 29th

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily. ENGINEER IMPLANTS CHIP IN HIS HAND TO BYPASS SECURITY SCANS AND EXPLOIT ANDROID PHONES FROM THE […]

Continue Reading

 

ThreatScape Media Highlights Update – Week Of April 22nd

ThreatScape Media Highlights Update – Week Of April 22nd

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily. APPLE FAILED TO FIX ‘ROOTPIPE BACKDOOR FLAW FROM THE MEDIA Apple patched Mac OS X vulnerability […]

Continue Reading

 

Thoughts from RSA: Improving it All – Strategic, Operational, Tactical with Cyber Threat Intelligence

Thoughts from RSA: Improving it All – Strategic, Operational, Tactical with Cyber Threat Intelligence

Cyber Threat Intelligence as a concept is currently a morass of confusion at a high level. Just look at all of the announcements over the past week, and over the past day at the RSA Conference, and it is hard to disagree. What constitutes intelligence, where you can get it, […]

Continue Reading

 

Verizon DBIR 2015 Says True Cyber Threat Intelligence Must Provide Context…TRUE DAT!

By

April 16, 2015

iSIGHT Partners

Verizon DBIR 2015 Says True Cyber Threat Intelligence Must Provide Context…TRUE DAT!

On Tuesday, I was pleasantly surprised to see that it was that time of year again. Time for a new copy of Verizon’s annual Data Breach Investigations Report. While that may not do a whole lot for you, as a full blooded dork I’m genetically inclined to get all giddy […]

Continue Reading