Our Blog
Check back for weekly updates
Geopolitical Monitoring Report | August 26, 2022
Global Ukraine War, Extreme Weather, and Energy Shortages Foreshadow a Long Winter Background: Energy and food shortages stemming from the Russian invasion of Ukraine – coupled with widespread drought in Europe and China – are likely to have a...
Geopolitical Monitoring Report | August 12, 2022
Global Lebanese gunman holds bank staff hostage to access his savings: DW Background: The gunman robbed the bank because he was unable to withdraw money from his savings to pay for his father’s medical bills due to the strict capital controls enacted by...
Geopolitical Monitoring Report | August 5, 2022
Asia | China/United States China fires missiles in largest drills ever around Taiwan: Nikkei Asia Background: The military drills around Taiwan began at 12 PM local time on August 4 and are scheduled to conclude on August 7. Beijing launched the...
Nisos Named Top Threat Intelligence Provider by Enterprise Security Magazine
Nisos is proud to have been recognized by Enterprise Security Magazine, a prominent technology magazine that highlights key solution providers serving enterprises, as one of the Top 10 Threat Intelligence Solutions Providers in 2022. Enterprise Security provides an...
Geopolitical Monitoring Report | July 28, 2022
Europe & Eurasia | European Union/Russia EU deal to reduce consumption highlights divisions within the bloc: DW Background: The deal agreed upon by the energy ministers of European Union member states will result in members voluntarily reducing their...
Geopolitical Monitoring Report | July 25, 2022
Europe & Eurasia | Canada/Germany/Russia Nord Stream 1: Canada to return repaired Russian pipeline part to Germany: DW Background: Canada announced that it will grant an exemption from its current sanctions on Russia to return a turbine for the Nord Stream...
A Sailing Trip Gone Awry
OSINT to the Rescue At Nisos, we are all about threat intelligence. We examine online sources to track threats to you and your business, and we provide meaningful analysis. We use OSINT, proprietary data, and paid data sources to attribute and correlate various...
15 Common Types of Business Fraud
Fraud is a constant thorn in the side of many enterprises. It affects not only their operations and their revenue. Fraud schemes compromise their employees and their customers. We have seen multiple versions of these fraudulent activities in our analyst-led threat...
5 Tips to Secure Your External Attack Surface
You know that cybersecurity is of the utmost importance for modern businesses, and as CISO, you do everything you can to keep things secure. From security controls and attack surface management tools, to vulnerability management and network security measures - you do...
What Are Bots and How Are They Used?
A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user needing to manually start them up every time. Bots often imitate or replace a human user's behavior...
Nisos Wins 2 Global Infosec Awards
The 9th annual Global InfoSec Awards found the most innovative, forward-thinking, and proactive cyber security companies who manage, create, and offer the most respected information security products and services. The awards, granted by Cyber Defense Magazine (CDM),...
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
An Investigative Report - May 2022 In March 2020, a hacktivist group called “Digital Revolution” claimed to have hacked a subcontractor to the FSB, the Federal Security Service of the Russian Federation. They claimed the hack occurred in April 2019. They...
Careful What You Wish For: The NewProfilePic App
Social media users have been abuzz about the ability to create a portrait-like image using the Newprofilepic app. “It really brings out the best in you!” they say. Then, one day, the buzz takes a turn - “You haven’t heard? The Newprofilepic app is Russian and sends...
Top 7 Digital Footprint Dangers for Executives
Corporate security and executive protection teams have a big job. Threats to key personnel are ever-present and increasingly originate online. It's not just physical security threats. Slander, libel, impersonation, fraud, and disinformation targeted against...
What Is Threat Intelligence?
Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated, processed, analyzed, and used to assess...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.