Skip to content
January 29, 2019The of Rise of Cyber Threat Intelligence in the War on Internet FraudStolen digital information accelerates and enables fraud. This simple truth is changing the way organizations think about protecting themselves from fraudsters. A recent example drives this point home. Ridesharing has become part of our daily life—Uber and Lyft are ubiquitous across the United States and abroad. Not long ago, someone began ordering rides and then […]
January 7, 2019Signal Versus NoisePromoting breach awareness The GroupSense team frequently finds evidence of a breach or data exposure for organizations that are not clients. Our policy is to notify those organizations and provide them with all the data, free of charge, as soon as we can. While this can be an interruption and costs our team precious time, […]
November 6, 2018The Death and Resurrection of Intel CutoutIntel CutOut was one of the few high-quality sources of sensitive information on the dark web. Given the high quality, relatively rare content, it seems that quite a few contributors were likely insiders in security/intel organizations. A number of breaches and security related threads appeared in Intel Cutout first or shortly after they were revealed […]
November 5, 2018Leaked Voter Databases Could be Weaponized for Election MeddlingOur Election Security Is Lacking New York State’s 2018 voter database was leaked and posted for free on a well-known forum about a week ago. The database included full name, physical address, previous addresses, date of birth, gender, voter ID, voter status, and voter history. Voter databases alone are not a huge threat. If a […]
October 10, 2017Behind the Scenes: CISOs and the Intelligence CommunityWhy would companies be recruiting and hiring information security executives from the Intelligence Community? The answer is in the intelligence discipline and how it applies to a holistic and effective security program.
October 9, 2017How To Use The Intelligence Cycle To Secure Your BrandThe Intelligence Cycle in Action: A case study illustrating how the Intelligence Cycle enables intelligence and security professionals to establish a plan of action and execute on that plan to deliver a high-quality intelligence product to their clients.
July 24, 2017How to Use Maltego to Conduct Threat ResearchMaltego is an interactive, visual data mining and link analysis tool used to conduct online investigations through a library of plugins called “transforms.” In this guide, we'll show you how to use Maltego to do threat research within your own organization.