An Asymmetric Cyber Strategy
Iran is no stranger to propaganda. The Islamic Republic owes its existence in part to the distribution of cassette tapes with the recorded speeches of Ayatollah Khomeini. These were smuggled…
Iran is no stranger to propaganda. The Islamic Republic owes its existence in part to the distribution of cassette tapes with the recorded speeches of Ayatollah Khomeini. These were smuggled…
CTIN’s Training Center is offering a selection of free online courses on STIX 2.1. Visit our Training Center and take advantage of this focused and informative content: Threat Analysis Frameworks…
According to a recent post by Qrator Labs, at 17:13 UTC on March 31, 2020, the AS50048 (NEWREAL-AS) leaked, in total, 2658 IPv4 network prefixes to the Tier-2 transit provider Transtelecom. Those…
The CTIN Team has recently been tracking a series of social media influence operations operatives that are currently targeting the US 2020 Election cycle with automated social media posts on…
An active phishing campaign is being propagated from a Spanish-themed domain name that alludes to El Molino Sabor (in English: “Mill Taste”) and shows a close-up of a Sweet Potato…
Photos from Africa that portray animals on the hunt for prey. The new cadre of cybersecurity professionals are gaining these skills. Why? Because with ISAOs they are learning to hunt…
Botnets are an insidious fact of the modern Internet. Botnets are groups of computers from all around the world that have been infected through some form of malware which, after…
Threat actors harvest email addresses, identification numbers, user name/password combinations, credit card information, health information and other personally identifiable information for nefarious purposes. This practice is what we are calling…
This essay provides links to some tools that analysts can use to visually display patterns of attack against a WordPress website. I've used attacks against this site as a case…
Security specialty firm Alien Vault develops excellent infographs that summarize in visual form some key points about cyber security. Here is one they developed on some of the most pernicious…