Identify, Research, Threats 02 Oct 2019 Emerging trends in threat actor communication methods Threat actors are adapting to current intelligence gathering techniques. We are observing the switch from hidden services (i.e. Tor) to conventional communication methods that are used by the general public.… Mark Stamford
Identify, Protect, Threats 03 Sep 2019 Tales From The Red Team Crypt – Episode 1 Welcome to The Red Team Crypt, where we keep the most riveting testing stories. Join me, the Crypt Keeper, through this week’s episode. Not everything is as it seems, and… Lord Nikon
Detect, Identify, Threats 06 Aug 2019 LinkedIn Pwnage: why we can’t all be friends Last July an article appeared on the outline entitled “How to Beat LinkedIn: The Game”, it’s an entertaining read regardless of how you feel about LinkedIn. Ever since reading it,… Mark Stamford
Identify, Strategy 02 Apr 2019 M&A Cybersecurity Articles appear almost daily detailing yet another significant merger or acquisition, a trend common across sectors and geographies. Also growing are the number of de-mergers and spin-outs, with new entities… Bob Hayes