Our Blog

Check back for weekly updates

Geopolitical Monitoring Report | August 12, 2022

Geopolitical Monitoring Report | August 12, 2022

Global   Lebanese gunman holds bank staff hostage to access his savings: DW   Background: The gunman robbed the bank because he was unable to withdraw money from his savings to pay for his father’s medical bills due to the strict capital controls enacted by...

read more
Geopolitical Monitoring Report | August 5, 2022

Geopolitical Monitoring Report | August 5, 2022

Asia | China/United States   China fires missiles in largest drills ever around Taiwan: Nikkei Asia   Background: The military drills around Taiwan began at 12 PM local time on August 4 and are scheduled to conclude on August 7. Beijing launched the...

read more
Geopolitical Monitoring Report | July 28, 2022

Geopolitical Monitoring Report | July 28, 2022

Europe & Eurasia | European Union/Russia   EU deal to reduce consumption highlights divisions within the bloc: DW   Background: The deal agreed upon by the energy ministers of European Union member states will result in members voluntarily reducing their...

read more
Geopolitical Monitoring Report | July 25, 2022

Geopolitical Monitoring Report | July 25, 2022

Europe & Eurasia | Canada/Germany/Russia   Nord Stream 1: Canada to return repaired Russian pipeline part to Germany: DW Background: Canada announced that it will grant an exemption from its current sanctions on Russia to return a turbine for the Nord Stream...

read more
A Sailing Trip Gone Awry

A Sailing Trip Gone Awry

OSINT to the Rescue   At Nisos, we are all about threat intelligence. We examine online sources to track threats to you and your business, and we provide meaningful analysis. We use OSINT, proprietary data, and paid data sources to attribute and correlate various...

read more
15 Common Types of Business Fraud

15 Common Types of Business Fraud

Fraud is a constant thorn in the side of many enterprises. It affects not only their operations and their revenue. Fraud schemes compromise their employees and their customers. We have seen multiple versions of these fraudulent activities in our analyst-led threat...

read more
What Are Bots and How Are They Used?

What Are Bots and How Are They Used?

A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user needing to manually start them up every time. Bots often imitate or replace a human user's behavior...

read more
Nisos Wins 2 Global Infosec Awards

Nisos Wins 2 Global Infosec Awards

The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most respected information security products and services. The awards, granted by Cyber Defense Magazine (CDM),...

read more
Careful What You Wish For: The NewProfilePic App

Careful What You Wish For: The NewProfilePic App

Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app. “It really brings out the best in you!” they say. Then, one day, the buzz takes a turn - “You haven’t heard? The Newprofilepic app is Russian and sends...

read more
What Is Threat Intelligence?

What Is Threat Intelligence?

Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated, processed, analyzed, and used to assess...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.