Jul 6

Cyveillance Phishing Report: Top Targets – July 6, 2015

General Cyber Intel Phishing

 

Phishing Report: Top Targets
Week of June 28 – July 4, 2015
Author: Robert McDaniel

Phishing Report

 

This week saw more than a 30% increase in phishing activity for the top 20 brands we’re tracking, grouped by industry. The biggest increases in phishing activity were in Computer Software (>180%), followed by Internet Content Providers (>165%), and Banking (>65%). While overall phishing activity increased, we saw a decrease in phishing activity for three industries. Internet Software & Services fell off the list with the largest decrease (>30%), followed by Storage & Systems Management Software (>7%), and eCommerce (>4%)

Read more

Jul 1

Special Report Excerpt, Part II: Assessing the Pan Am Games’ Threat Environment – Protests and Social Unrest

Executive Security General Cyber Intel

toronto1

By: Hans Mathias Moeller

The following blog post is an excerpt from our recently published special reportToronto Pan American Games 2015: Assessment of the Physical Threat Environment. This report examines the risks from protests, social unrest, natural hazards, terrorism, and other potential threats to the Games.

With the Toronto 2015 Pan American Games (Pan Am Games) only a few weeks away, organizations that may be sponsoring or sending participants to the Games need to be aware of the physical threat environment surrounding the event. In our first special report post, we provided a high level overview of the Games’ vulnerability to terrorist attacks. In this post, we review the potential threats to the Games from protestors and groups with social grievances.

Read more

Jun 30

Cyveillance Weekly Cyber Security Trends Report: June 30, 2015

General Cyber Intel

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Jun 29

Webinar Recap: Six Ways to Enhance Physical Security with Open Source Threat Intelligence

Cyber Threat Center Executive Security General Cyber Intel Social Media
social-media-488886_640

Source: Pixabay

By: Alyssa Shames

As hacking incidents such as the U.S. government’s Office of Personnel Management (OPM) data breach continue to dominate the news, many companies are taking note and ramping up their cybersecurity protocols. However, what is often overlooked is the online or cyber component of an organization’s physical security strategy, including executive protection. The role of threat intelligence here can be just as critical as it is in the more headline-grabbing areas of cyber risk.

Our Vice President of Product Strategy Eric Olson and Vice President of Cyber Security James Carnall hosted a webinar on this topic last week. In case you missed it, here’s a brief recap.

Read more

Jun 29

Cyveillance Phishing Report: Top Targets – June 29, 2015

Phishing

 

Phishing Report: Top Targets
Week of June 21 – 27, 2015
Author: Robert McDaniel

 

Phishing Report - Top Targets by Industry

This week saw more than a (>30%) decrease in phishing activity for the top 20 brands we’re tracking, grouped by industry. The biggest decreases in phishing activity were in Internet Software & Services (>90%), followed by Computer Software (>60%), and Internet Content Providers (>50%).

Read more

Jun 23

Cyveillance Weekly Cyber Security Trends Report: June 23, 2015

General Cyber Intel

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Jun 18

New gTLDs: Infringement Cases Illustrate Challenges for Trademark Owners

Domain Names and ICANN

chalk1

Author: Camille Stewart

New generic top-level domains (gTLDs) are ostensibly designed to promote innovation, brand equity, and competition in the domain name space, but the program is proving costly for many big brands. In previous posts we’ve explored the problems these new extensions pose for branding and security professionals, as well as the pros and cons of restricted gTLDs. Today we will examine three infringement cases that illustrate some of these challenges.

The new gTLD program has resulted in the increased registration of major brand names, which is causing a lot of concern for trademark owners. There have been a number of Uniform Rapid Suspension System (URS) and Uniform Domain-Name Dispute-Resolution Policy (UDRP) cases filed in response. While most brands have registered their trademarks in the original top-level extensions, such as .com, .net, and .org, the introduction of more than 1,000 new gTLDs means thousands of potential new trademark infringement cases.

Read more

Jun 17

Using Image Search Tools to Improve Your Security Program

General Cyber Intel

dupe_image1

Author: Nicole Sroka

Last week we discussed our expanded Global Intelligence capabilities, the first of two recent enhancements to the Cyveillance Cyber Threat Center™. Today, we will go over the second new feature, Content-based Image Retrieval (CBIR).

It’s estimated that 85 percent of images online are used without permission, so there’s a good chance your brand’s images are being shared, used, and even repurposed without your knowledge. Content-based Image Retrieval provides analysts with a tool for image monitoring for instances when an organization’s logo, photos of executives, or company buildings are posted online. CBIR matches the image itself, not the text in the metadata associated with the image, allowing you to find the image even if it has been altered.

Read more

Jun 16

Cyveillance Weekly Cyber Security Trends Report: June 16, 2015

General Cyber Intel

 

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Subscribe to Our Blog!

Join thousands of security professionals and get our latest blog content in your inbox.

Your information will never be shared.

×