<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>threats Archives - Threat Potential</title>
	<atom:link href="https://threatpotential.com/category/threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatpotential.com/category/threats/</link>
	<description></description>
	<lastBuildDate>Thu, 06 Apr 2023 21:02:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>The Overlooked Risk &#8211; Physical Security</title>
		<link>https://threatpotential.com/the-overlooked-risk-physical-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-overlooked-risk-physical-security</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Thu, 05 Jan 2023 21:36:41 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[defense in depth]]></category>
		<category><![CDATA[physical security]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3625</guid>

					<description><![CDATA[<p>As a business owner or manager, it&#8217;s easy to focus on digital security threats like cyberattacks and data breaches. However, physical security is just as important, if not more so, for protecting your business&#8217;s assets and employees. Imagine a burglar breaking into your office and stealing valuable equipment or sensitive documents. The financial and reputational...</p>
<p>The post <a href="https://threatpotential.com/the-overlooked-risk-physical-security/">The Overlooked Risk &#8211; Physical Security</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As a business owner or manager, it&#8217;s easy to focus on digital security threats like cyberattacks and data breaches. However, physical security is just as important, if not more so, for protecting your business&#8217;s assets and employees.</p>



<p>Imagine a burglar breaking into your office and stealing valuable equipment or sensitive documents. The financial and reputational damage that could result from such an incident is significant. This is why physical security is so important to businesses.</p>



<p>Physical security measures such as locks, alarm systems, and surveillance cameras can deter potential burglars and protect your business from loss or damage. It&#8217;s also important to have protocols in place for handling emergency situations, such as fires or active shooter situations.</p>



<p>Think of physical security as the foundation of your business&#8217;s security plan. Just as a house needs a strong foundation to stand on, your business needs strong physical security measures to protect against potential threats.</p>



<p>So, how can you improve physical security in your business? Here are a few tips:</p>



<ol class="wp-block-list" type="1">
<li>Conduct a security assessment to identify vulnerabilities and areas for improvement.</li>



<li>Implement measures such as locks, alarm systems, and surveillance cameras.</li>



<li>Establish protocols for handling emergency situations and regularly train employees on these protocols.</li>



<li>Restrict access to certain areas or sensitive information to authorized personnel only.</li>



<li>Regularly update and maintain physical security measures to ensure they are functioning properly.</li>
</ol>



<p>Physical security is often overlooked, but it&#8217;s a crucial aspect of protecting your business&#8217;s assets and employees. Don&#8217;t neglect this important aspect of security – take the necessary precautions and invest in physical security measures.</p>



<p>If you&#8217;re looking for physical penetration testing services, Threat Potential would love to help you, <a href="https://threatpotential.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> today!</p>
<p>The post <a href="https://threatpotential.com/the-overlooked-risk-physical-security/">The Overlooked Risk &#8211; Physical Security</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSINT and Your Organization</title>
		<link>https://threatpotential.com/osint-and-your-organization/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=osint-and-your-organization</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 21:54:31 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[osint]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3637</guid>

					<description><![CDATA[<p>We often discuss the importance of OSINT (Open-Source Intelligence) in cyber threat intelligence. But what exactly is OSINT, and why should an organization care? Read on to get a high-level view of the concepts and its applicability in securing an organization. What is OSINT OSINT refers to the collection and analysis of information from publicly...</p>
<p>The post <a href="https://threatpotential.com/osint-and-your-organization/">OSINT and Your Organization</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We often discuss the importance of OSINT (Open-Source Intelligence) in cyber threat intelligence. But what exactly is OSINT, and why should an organization care? Read on to get a high-level view of the concepts and its applicability in securing an organization.</p>



<h3 class="wp-block-heading">What is OSINT</h3>



<p>OSINT refers to the collection and analysis of information from publicly available sources. This can include social media, websites, forums, <a href="https://thor-sec.com/shodan/shodan_intro/">online search engine</a>s, and other online resources. OSINT is like a detective gathering clues and piecing together a puzzle – it involves using various sources of information to gain a complete understanding of a situation, target, or threat.</p>



<h3 class="wp-block-heading">Why you should care</h3>



<p>So, why should an organization care about OSINT? In the cyber security world, OSINT can be used to gather information on potential victims, for use in attacks such as malware campaigns or phishing scams. By collecting and analyzing this information, organizations can proactively protect themselves from potential attacks.</p>



<p>OSINT can also be used to gather intelligence on an organization&#8217;s competitors or the broader market. By understanding what information is available about your organization online, you can identify any potential vulnerabilities and take steps to protect your assets.</p>



<p>Attackers performing thorough reconnaissance against their target often gives them the needed information to successfully attack an organization. Advanced persistent threats also known as APT&#8217;s, perform this to a very high degree and is often the success factor in their attempts to breach a target.</p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>In summary, OSINT is a valuable tool for organizations looking to improve their cybersecurity. By collecting and analyzing public information, organizations can identify potential vulnerabilities and threats, as well as stay up to date on the latest trends and threats in the cybersecurity landscape.</p>



<p>If you&#8217;re looking for external penetration testing services, Threat Potential would love to help you, <a href="https://threatpotential.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> today!</p>
<p>The post <a href="https://threatpotential.com/osint-and-your-organization/">OSINT and Your Organization</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Find You</title>
		<link>https://threatpotential.com/how-attackers-find-you/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-attackers-find-you</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 14:17:00 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3465</guid>

					<description><![CDATA[<p>While creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has wore off from a breach, the effected company will ask themselves “Why us?”. It’s a valid question and one that organizations should ask before an incident occurs to better prepare themselves. There are a multitude of reasons why...</p>
<p>The post <a href="https://threatpotential.com/how-attackers-find-you/">How Attackers Find You</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>While creating a defensive plan against cyber-attacks,
knowing your adversary is paramount. Often after the shock has wore off from a
breach, the effected company will ask themselves “Why us?”. It’s a valid
question and one that organizations should ask before an incident occurs to
better prepare themselves. There are a multitude of reasons why an attacker
chose your organization and below I’ve captured some of the more common reasons.
</p>



<h4 class="wp-block-heading">Opportunity</h4>



<p>These attacks are typically based on a unique opportunity
that makes your organization an easier target than others. Usually these items
are in an organization’s circle of influence and can take steps to reduce.</p>



<ul class="wp-block-list"><li><strong>Technology stack</strong><ul><li>Attackers use tools such as search engines (Google, Shodan.io) and job boards to map specific technology use that have experienced recent vulnerability disclosures or are frequently misconfigured. This also provides attackers an opportunity to try weak or default credentials to gain additional access.</li></ul></li><li><strong>Public information disclosures</strong><ul><li>Credential disclosures are commonly shared on the internet and within hacker communities. Employees often times reuse their work passwords on outside services that experience a breach which make for easy credential stuffing attacks. Services such as haveibeenpwned.com allow for organizations to effortlessly discover when a credential containing their domain has been disclosed.</li></ul></li><li><strong>Phishing</strong><ul><li>Many phishing campaigns permutate domains from lists or crawled from the internet in some fashion. If an employee falls victim to a phishing attack then they take advantage of this newly gained access, if not then they continue on to the next potential target.</li></ul></li></ul>



<h4 class="wp-block-heading">Targeted</h4>



<p>These attacks are directed at the organization itself and
often include detailed research and recognizance. Traditionally attackers will
utilize opportunistic attacks for quick access but dive much deeper.</p>



<ul class="wp-block-list"><li><strong>Industry Type</strong><ul><li>Often the type of industry that the organization is apart of will draw specific attention such as financial institutions, government entities, and industrial companies. The attacker is looking for a specific asset that the entity possesses or perhaps there’s a controversial issue which spawn hacktivism.</li></ul></li><li><strong>Target by proxy</strong><ul><li>Some organizations that experienced a breach learn that they were simply a stepping stone to leverage a relationship to attack their partner, supplier, or customer. </li></ul></li><li><strong>Insider Threat</strong><ul><li>While not historically thought of as a way of targeting an organization, insider threats such as disgruntled employees or fraud are commonplace and need to be accounted for.</li></ul></li></ul>



<p>Each organization should be having a conversation on why and
how they may be targeted in the future. In many cases, a quick and easy change
could have prevented a drastic and costly security incident.</p>
<p>The post <a href="https://threatpotential.com/how-attackers-find-you/">How Attackers Find You</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
