Every hour of every day, criminals, nation states, and fraudsters around the world commit attacks using phone numbers, email addresses, and social media handles. We call these “selectors,” i.e. the technical attributes of an online entity.
7 min read
What is a Selector in the World of Digital Crime?
By Adam Gayde, Michael Eller, and Matthew Brock on Sep 9, 2020 9:36:30 AM
1 min read
How to Use Breach Credentials to Support Intelligence Collection and Attribution
By Jared Hudson, Zeshan Aziz, and Dev Badlu on Aug 19, 2020 1:38:57 PM
While some organizations may view third party breach usernames and passwords as important indicators to prevent unauthorized access to their own networks, larger organizations are using two factor authentication for securing their perimeters by locking down internet-facing services where the mere availability of these credentials are less actionable.
4 min read
Five Critical Data Source Considerations for Adversary Attribution
By Jonathan Neuhaus & Adam Gayde on Aug 12, 2020 12:31:41 PM
Strong intelligence is the base of adversary attribution; nothing can replace the holistic picture created by technical indicators in combination with HUMINT and OSINT sources.