|
By admin
Another SaaS integration for the books! Incidents can now be automatically generated in the portal from email addresses in ProofPoint alerts. These are then linked to portal users, as well as any devices those users are logged in to.
|
By admin
ThreatSpike can now autofill your email, password, and even MFA using credentials stored in your Vault. The popup UI allows you to easily select between multiple credentials. Coming soon: Expanding the website support for autofill Automatically importing logins to the ThreatSpike Vault upon login.
|
By admin
ThreatSpike can now use JumpCloud’s Directory Insights API to pull in Login Events, which are automatically analyzed. If suspicious activity is identified, a SaaS Unusual Login incident will be raised – with our 24/7 SOC team on standby to confirm, investigate, and remediate the issue.
|
By admin
You can now easily request a pen test from within the ThreatSpike Portal, following a simple guided questionnaire custom to each pen test type. Whether it’s a Red Team, Web App, or even a Physical – you can request it here!
|
By admin
Phishing continues to be the most common way attackers gain initial access. If you want to prevent phishing in your organisation, it starts with understanding how these campaigns suceed and why they continue to bypass traditional controls. Drawing on insights from our recent webinar Red Team Insights: What We’ve Learned from Breaching the Best, this article explores the tactics attackers rely on and the steps security teams can take to strengthen their defences.
|
By Adam Blake
Last October marked a turning point for ThreatSpike. Not only did we start the conversations around our Series A funding round. But also the mission expanded, not just to protect companies from cyber threats, but to give any business, of any size, access to IT and security at a standard most people assumed was only possible for global corporations.
|
By Adam Blake
Most businesses do not set out wanting to change MSPs. They make the choice once, sign the contract, and hope they never have to think about it again. The whole point is to make IT easier, to have someone else deal with the problems so the business can get on with its job.
The high profile MGM Resorts hack by ransomware group ALPHV/BlackCat has served as a wake up call to the hospitality industry, demonstrating that the industry is a lucrative target for cybercriminals. The hack was hugely impactful to MGM making for sensational headlines in mainstream media, however what struck security experts were the social engineering methods used by the threat actors and how effective they were in bypassing security controls and technologies.
|
By Aaron Hau
In a recent social-engineering attack targeting the hospitality sector observed by the ThreatSpike team, there appears to be a change in the tactics employed by the threat actor. The hospitality sector, where top-notch customer-service is expected, customer-facing employees are often lucrative targets for phishing, as detailed in our previous blog post.
|
By Aaron Hau
Humans are the weakest link in cybersecurity, and it is inaccurate to say that IT administrators, who often have access to sensitive data and systems, are invulnerable. In this blog post, we demonstrate how a Red Team Operator achieved full Active Directory domain compromise as a result of an IT Administrators’ poor cyber hygiene.
- April 2026 (1)
- March 2026 (1)
- February 2026 (1)
- December 2025 (1)
- November 2025 (1)
- September 2025 (1)
- August 2025 (1)
- May 2025 (1)
- April 2025 (1)
- April 2023 (1)
- March 2023 (3)
- February 2023 (2)
- January 2023 (2)
- February 2021 (1)
- January 2021 (5)
- August 2020 (1)
- May 2020 (1)
- January 2020 (1)
ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes. We monitor networks for a broad range of security issues, tailoring our monitoring for the specific industry and requirements of each customer.
ThreatSpike's software defined security platform takes only a few hours to install after which time all activity on the network is monitored by a team of highly trained analysts and penetration testers. Companies are alerted in real time to any active threats, as well as weaknesses that could be used by attackers at a later time.
What can ThreatSpike detect?
- Hacking: We monitor for hacking including reconnaissance, network and application exploits as well as lateral movement.
- Malware: We use methods including machine learning to detect malicious executables, command and control activity as well as network propagation.
- Vulnerabilities: We monitor for weaknesses in technology systems and business processes that may be used to steal data and commit fraud.
- Insider Threats: We monitor logins, authorisation changes, access reach, electronic communications and data transfers to detect insider threats.
One Platform. One Partner. Complete Security.