Category: Research

In this edition of our Sector Spotlight series, we review recent open-source research on cyber adversary and vulnerability intelligence relevant to the Waste and Water Sector (WWS), Communications, Electric Power, and Defense Industrial Base sectors. This…

On 22-October-2024, The Computer Emergency Report Team of Ukraine (CERT-UA) and Amazon issued Cyber Threat Intelligence (CTI) alerts. Microsoft followed with a detailed blog post on 29-October. These alerts described a targeted phishing and espionage…

In the wake of two catastrophic hurricanes and with just two weeks until highly divisive U.S. elections, the U.S. faces unprecedented challenges. Millions have lost loved ones, homes, and livelihoods. Damage estimates range from $20…

Big Events have a way of changing editorial calendars. Before taking a brief Labor Day break, Iran’s Election Interference was next on our calendar. But things changed on 4-September with DOJ’s court filings on Russian…

The Spamhaus DROP list – “DROP (Don’t Route Or Peer) and EDROP are advisory “drop all traffic” lists, consisting of stolen ‘hijacked’ netblocks and netblocks controlled entirely by criminals and professional spammers.” Basically, the DROP…