Dive into reconnaissance and MITRE’s PRE-ATT&CK
EASM
In this blogpost, we will explain the preparation phase of threat actors. We will explore reconnaissance – the playing field...
RESEARCH
An analysis of a spam distribution botnet: the inner...
Research & Threat Intel
Successful cybercrime campaigns make use of different elements working together to achieve their common goal. In the case of Onliner,...
real-time-threat-intelligence
Real-time threat detection and why timing is the key...
Research & Threat Intel
You wouldn’t sit idle under siege. However, when it comes to confronting real-time cyberthreats, it is what some businesses are...
The top 10 list of the world’s biggest cyberattacks
Application Security
Looking back over the years and what we see happening now is the same attack vectors being used that have...
threat intelligence
What is Threat Intelligence and why is it important?
Research & Threat Intel
In this article, we will define what threat intelligence is – and what it isn’t – by differentiating it from...