top of page

Search


Apple and Netflix Targeting
Jigsaw Security noted several Apple domains and uncovered additional Netflix domains of interest that appear to be in the staging phase...

Security Operations
Aug 12, 20201 min read


Using Pi-hole™ to protect networks
Using Jigsaw Security data with open source Pi-Hole

Kevin Wetzel
Jun 17, 20203 min read


Jigsaw Security consolidated US Watch List
As part of our ongoing intelligence system integration, Jigsaw Security has added US Debarred Companies, Sanctions List, Entity list and...

Security Operations
May 18, 20201 min read


Espionage on the rise
Nearly every single day we get calls from customers in our “Jigsaw Threat Mitigation Model” program that complain of insider threat...

Security Operations
May 16, 20202 min read


Jigsaw Security develops binary explosives system
One of the major issues in utilizing and handling binary explosives is the fact that the explosive cannot be mixed until ready to use and...

Security Operations
May 6, 20201 min read


New Bomb Scene Investigations Course Coming Soon!
Jigsaw Security has begun working on a new CE course titled "Bomb Scene Investigations Understood". The new course will cover a wide...

Security Operations
May 5, 20201 min read


Jigsaw Security builds EOD library in Intelligence stack & tracking COVID-19
Over the past 6 months, Jigsaw Security has launched an intelligence platform that can be viewed as an all source intelligence system....

Security Operations
May 1, 20201 min read


Eavesdropping has picked up with China and Russia going after vaccine manufacturers
Over the last several weeks as the pandemic has unfolded the number of cyber attacks originating out of China and Russia has increased...

Security Operations
Apr 30, 20201 min read


Doubling down on Pi-Hole - Integrating Jigsaw Security data for CMMC compliance
Obviously the CMMC compliance is on top of our to do list. We have been attending many of the talks and introductions of the goals of...

Security Operations
Apr 15, 20202 min read


Jigsaw Security provides Pi-Hole Blocklist
Jigsaw Security has implemented a blocklist for domains that can be used with Pi-Hole to block malicious malware, ads and C2 callbacks...

Security Operations
Apr 10, 20201 min read


Jigsaw Security develops improved ground blast simulators
Jigsaw Security working in collaboration with business partners has started working on a new and safer design for the US Army M115A2 and...

Security Operations
Apr 10, 20201 min read


Private Intelligence - Why it matters
The founders at Jigsaw Security all originated out of the intelligence community. Upon leaving the IC, many of us missed the tools the...

Security Operations
Mar 22, 20203 min read


Jigsaw test Emergency Communications
On Monday morning, Jigsaw Security tested communications to include satellite based SMS and other terrestrial communications systems. In...

Security Operations
Mar 16, 20201 min read


COVID-19 Phishing, Lures and More
During the COVID-19 world outbreak we are seeing threat actors take advantage of the situation to gain more infections. We are taking the...

Security Operations
Mar 15, 20201 min read


New training courses accepted for CE credit - North Carolina
JIgsaw Security submitted four courses to the North Carolina Private Protective Services Board for CE credit. WE have received approval...

Security Operations
Mar 8, 20201 min read


SDR use in TSCM
We are happy to announce that we are now providing our SDR use in TSCM class for CE credits. The course consist of 8 hours of continuing...

Security Operations
Feb 24, 20201 min read


Jigsaw Security SearX Search Utility Available
Jigsaw Security announced earlier this week that we were launching a search engine. The new search is not online at...

Security Operations
Feb 18, 20201 min read


New Search Engine Capability
Jigsaw has provided a new search capability that keeps your data from being exposed to the search engines. As always you can tunnel your...
Jigsaw Security Enterprise Intelligence Team
Feb 14, 20201 min read


Ryuk being pushed from Azure... The question is why?
Looking at the latest Ryuk activity today shows that an IP address 52[.]158[.]209[.]219 is consistently showing up and pushing the...
Jigsaw Development Team
Jan 29, 20201 min read


Intelligence no longer has to be hard to implement
One of the recurring themes we hear at Jigsaw Security is that our customers are tired of consuming IOC feeds and that many customers...
Jigsaw Security
Jan 28, 20202 min read
bottom of page