June 28, 2019Empire Market Could be the Next Dropped or Seized Dark Web MarketplaceThe seizures and disappearances of numerous major dark web marketplaces, including Hansa, Dream Market, Wall Street, and Rapture have left Empire Market as the largest and most likely last major dark web market. In the past two months, Empire Market has dominated its niche on the dark web with posts and offers of drugs, fraud, […]
June 4, 2019A CISO’s Perspective: Michael Lines Shares How CISOs Can SucceedAs a CISO, you constantly worry if today is the day you’ll have a security incident. It’s a common problem. There are huge expectations on you and your team, but the support from the business is not always in line with those expectations. For today’s post, we interviewed cyber risk expert Michael Lines. Over the […]
May 15, 2019Venezuela’s Unrest Evident on the Dark NetIn case you’re unaware, there’s significant unrest in Venezuela. The country has had political and civil unrest for years, but recently came under increased global scrutiny due to the continued collapse of its economy, and its worsening living conditions. Its people have suffered from power outages, water shortages and lack of toilet paper, food, and […]
April 24, 2019Supply Chain and Third Party Risk: A growing concern for enterprise and governmentsCyber reconnaissance isn’t just about protecting your organization – it’s also about keeping an eye on your business partners and supply chain. This is important, as attackers often find it easier to breach third-party suppliers and move laterally into well protected organizations. Larger organizations – including government institutions – typically have strong, mature security programs […]
April 19, 2019Billions of credentials spanning 1,700 breaches released onlineAn unnamed Russian threat actor has released a file containing 3 billion unique combinations of emails and passwords on a well known Russian forum. The records appear to have been sourced from an illicit distributor of credentials, claiming to have 13 billion records. Figures 1 & 2 above are screenshots of breached credential websites operated […]
April 1, 2019Don’t be April Fooled by Cyber FraudWith losses skyrocketing past $1.4 billion, cyber fraud is no laughing matter. Last year alone, over 300,000 consumers reported cyber fraud and malware attacks to the FBI’s Internet Crime Complaint Center (IC3). In celebration of a fool’s holiday, we thought we’d share a few interesting tools and scenarios we’ve seen recently, so without further ado […]
March 25, 2019The 5 Reasons WhatsApp Could be a National Security RiskLast week I was asked by one of the 24-hour news networks to comment on camera about Jared Kushner’s use of WhatsApp for official White House business. The news network wanted my thoughts on the vulnerabilities and risks associated with this behavior. My first thought was that this was outside the core focus of what […]
March 19, 2019Facebom: A targeted bruteforce tool poses a serious threat to individuals and enterprisesRecently, “teamkelvinsecteam’, one of the most active hacking groups released Facebom on a deep web forum; Facebom is an individualized brute force software targeting Facebook. Due to the targeted nature of this tool, the GroupSense research team believes Facebom poses a threat to individuals and enterprises alike. So what if everyone’s Facebook account gets hacked? […]
March 7, 2019VOIP Voice Conversations Posted on Forum, PII ExposedBy virtue of monitoring conversations in illicit forums, our team frequently stumbles across some unwitting enterprise’s data. Often the data is in the form of a database dump, personally identifiable information (PII), account information, or credentials. Occasionally, though, there is something unique. What’s worse than a data dump? Recently our team observed a well-known threat […]
January 29, 2019The Rise of Cyber Threat Intelligence in the War on Internet Fraud
January 7, 2019Signal Versus Noise
November 6, 2018The Death and Resurrection of Intel Cutout
November 5, 2018Leaked Voter Databases Could be Weaponized for Election Meddling
October 10, 2017Behind the Scenes: CISOs and the Intelligence CommunityWhy would companies be recruiting and hiring information security executives from the Intelligence Community? The answer is in the intelligence discipline and how it applies to a holistic and effective security program.
October 9, 2017How To Use The Intelligence Cycle To Secure Your BrandThe Intelligence Cycle in Action: A case study illustrating how the Intelligence Cycle enables intelligence and security professionals to establish a plan of action and execute on that plan to deliver a high-quality intelligence product to their clients.
July 24, 2017How to Use Maltego to Conduct Threat ResearchMaltego is an interactive, visual data mining and link analysis tool used to conduct online investigations through a library of plugins called “transforms.” In this guide, we'll show you how to use Maltego to do threat research within your own organization.