philippine threat landscape

Philippine Threat Landscape Report 2024-2025

An overview of the Philippine threat landscape for 2024-5 covering phishing trends, ransomware and more
Learn more
attack surface management: aev

Attack Surface Management: From Passive Scanning to Active Security Testing

Learn more
cl0p

CL0P Ransomware: The Latest Updates

Utilizing common 'steal, encrypt and leak' tactics, victims failing to meet CL0P group ransom demands…
Learn more
cisco data leak

Cisco Data Leak: The Facts on the Ground

On October 14th, prior to the data leak on December 16th, a threat actor known…
Learn more
5 biggest feature additions in 2024

The 5 Biggest Feature Additions to Cyberint in 2024

From a new risk dashboard to a new takedown request tracking screen see what we…
Learn more
alon davidoff third party sites credentials

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often sign up with a corporate email address on 3rd party sites. However, this…
Learn more
Active Exposure Validation

The ROI of Active Exposure Validation

What is Active Exposure Validation (AEV) and how does it help with EASM detection and…
Learn more
Integration blog

Cyberint’s Integration with Check Point: Challenges and Endless Possibilities

How does the Check Point acquisition of Cyberint help both products provide world-class security
Learn more
instagram brand protection

Instagram Brand Protection: Strategies to Safeguard Your Business

Instagram impersonation is causing serious financial and reputational harm to businesses. Cyberint looks at what…
Learn more
pig butchering

The Rise of Pig Butchering Scams

Figure 1: FBI report highlights a significant rise in both the number of complaints and…
Learn more
retail threat landscape

Retail Threat Landscape 2024

Figure 3: GitHub Comments Distributing Malware Hosted on Microsoft’s Official GitHub Repository Figure 4: Top…
Learn more
Finastra Breach

Finastra Breach: Findings and Summary

Figure 1: Screenshot of the original post Figure 2: Screenshot of sample data from the…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start