Our Blog
Check back for weekly updates
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
An Investigative Report - May 2022 In March 2020, a hacktivist group called “Digital Revolution” claimed to have hacked a subcontractor to the FSB, the Federal Security Service of the Russian Federation. They claimed the hack occurred in April 2019. They...
Careful What You Wish For: The NewProfilePic App
Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app. “It really brings out the best in you!” they say. Then, one day, the buzz takes a turn - “You haven’t heard? The Newprofilepic app is Russian and sends...
Top 7 Digital Footprint Dangers for Executives
Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online. It's not just physical security threats. Slander, libel, impersonation, fraud, and disinformation targeted against...
What Is Threat Intelligence?
Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated, processed, analyzed, and used to assess...
Russia Isn’t the Only Nation State Threat Actor: Keep an Eye on These Three Nation States
The Russian aggression against Ukraine is no secret. It has certainly been getting a lot of airtime lately. Everybody seems to have written a blog or a white paper. Heck, even we did. In our recent blog, Russian Aggression and Its Potential Impact on the West, we...
Influencing the Narrative: Nisos Investigates an Inauthentic Xinjiang Twitter Network
An Investigative Report - April 2022 EXECUTIVE SUMMARY The Chinese Communist Party (CCP) has come under international scrutiny for the treatment of the Uyghur ethnic minority within Xinjiang. Nisos researchers discovered a coordinated inauthentic network...
How Do Cybercriminals Steal Credentials?
Cybercriminals have access to billions of email and password combinations on the dark web. There are many ways user credentials can end up being auctioned off on the black market. Finding out that your users’ credentials have been leaked is anxiety-producing, to say...
5 Signs You Need an Enterprise Cyber Fusion Center
The concept of a fusion center originated in response to the intelligence-sharing challenges of the war on terror. Typically state-owned and operated, a fusion center distributes threat-related information between state, local, tribal, federal, and private sector...
Why Physical Security and Cybersecurity Must Work Together
As more and more aspects of business move into the digital world, the internet provides many conveniences and opportunities to increase productivity. But there are vulnerabilities to consider. Most enterprises understand the importance of cybersecurity and physical...
Colombian Election Disinformation Campaign: The Role of Venezuelan Leftists
An Investigative Report - March 2022 EXECUTIVE SUMMARY Nisos researchers have completed an investigative report on election influence related to the upcoming Colombian Presidential election. Before discussing the details of this investigation, it is...
Russian Aggression and Its Potential Impact on the West
History and current intelligence indicate Russia’s strategic objective is to install a puppet regime in Kyiv favoring Moscow. These actions echo previous Russian activity in Belarus and Kazakhstan and will help to limit the perceived threat of NATO expansion. Current...
Domain Abuse: What to Look For and Monitor
Let’s say that you have just signed up for a new subscription to a software program. You’re new to the company and service and learning the ropes of this new program. As you are getting started, your email inbox pings with a new email alert. You open it, and it...
S&P Global and 451 Research Predict Continued M&A Acceleration in 2022
Mergers and acquisitions aren’t slowing down anytime soon. As M&A activities accelerate, early and comprehensive due diligence is increasingly important. According to their recent report, S&P Global and 451 Research say that M&A deals will match or outpace...
Nisos Wins 11 Cybersecurity Excellence Awards
The Cybersecurity Excellence Awards honor companies, services, and individuals that demonstrate excellence, innovation, and leadership in the information security sector. Produced by Cybersecurity Insiders, this worldwide award program taps into the vast experience of...
Chinese Commercial Firm OneSight Conducts Disinformation Operations in Support of the Chinese State against Uyghurs
Nisos research revealed Chinese commercial marketing firm OneSight developed a sophisticated social media management and monitoring system to propagate political disinformation against the Uyghur community. The research indicates the campaign was likely conducted on...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.