Threat Intelligence Requirements

Threat Intelligence Requirements

Establishing Threat Intelligence Requirements should be one of the first things organizations do when starting a Cyber Threat Intelligence (CTI) program. Requirements provide goals and objectives for CTI teams that, when met, equip stakeholders with the required knowledge that will enable teams to better protect and defend the organization.

read more
LetItGo: A Case Study in Expired Domains and Azure AD

LetItGo: A Case Study in Expired Domains and Azure AD

By identifying and purchasing an expired domain tied to an existing Azure AD organization, an anonymous attacker can use PowerBI or PowerAutomate to create an account and gain access to that organization’s tenant, including resources shared within that tenant (e.g., OneDrive, SharePoint, etc.). The attacker is effectively a “domain user” in that tenant. SRA created a tool called LetItGo that queries an organizations’ domain listing and returning any domains that are expired.

read more

Posts

Cyber Kumite

Listen to the Cyber Kumite Podcast and Video Series

Each week we deliver new discussions about the cybersecurity industry, challenges, and best practices. CISOs and other security specialists join us to bring their insight on each topic.

Interested in what we do?

Explore our Advisory Services to learn how our team can help improve your cyber program.