• Monitoring the Entire Web with Google Custom Search

    Written By: Idan Aharoni      Nov 16, 2018
    Whether the goal of your web intelligence activities is to detect cybercrime, identify threats to your organization or collect insights on your competitors, one of the most powerful and useful tools available is Google Search. While the average person uses Google Search to find r... Read More
       , ,
  • Pastebin Monitoring Methods

    Written By: Idan Aharoni      Oct 5, 2018
    When we start working with a new customer, we usually receive a wish-list of sources that they wish to monitor using our platform. Based on the sources indicated on the list, we set up the coverage of the system. One of the sources that keeps coming up on these wish-lists, reques... Read More
       , ,
  • Domain Hijacking and Pharming Attack Detection Using DNS Querying

    Written By: Idan Aharoni      Jul 8, 2018
    In recent years, malware and the exploitation of vulnerabilities have been receiving a major chunk of the cyber security attention, as well as the focus of threat intelligence, to the point where “threat intelligence” is a term that can often be substituted with “malware IO... Read More
       ,