Ransomware Groups Report 2024 – Q2

q2 ransomware report

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well as top families and targeted sectors and countries.

Continue reading
b1ack stash

B1ACK’S STASH: A Comprehensive Analysis of the Free 1 Million Card Leak 

Is B1ACK STASH's 1 Million card lead real? The Cyberint team analysed the leak and…
Learn more
RSA CONFERENCE EVENTS

The Parties and Events at RSA Conference You Don’t Want to Miss

We've detailed every event we could find below, and we've saved the best to last…
Learn more
open bullet 2

Open Bullet 2: A Tool for Credential Stuffing Attacks

Open Bullet 2 is a web testing tool, but it's become popular with hackers using…
Learn more
GuLoader

GuLoader Downloaded: A Look at the Latest Iteration

GuLoader stands out as a prominent downloader founded on shellcode that has been used in…
Learn more

Meta is down: Skynet and Other Groups Claim to Have Attacked

Learn more
ctem

Putting CTEM Into Practice: The Five Key Steps

Continuous Threat Exposure Management, or CTEM, is a critical component of any cybersecurity strategy. But what…
Learn more
The Do-Not Miss Cybersecurity Events and Conferences of 2024 

The Do-Not Miss Cybersecurity Events and Conferences of 2024 

Book your calendars because Cyberint has put together The Do-Not Miss Cybersecurity Events and Conferences…
Learn more
Whose Behind the Cloak: Cloak Ransomware

Cloak Ransomware: Who’s Behind the Cloak?   

A new ransomware group has emerged, Cloak Ransomware. Learn about their TTPs, recent attacks and…
Learn more
Securing Voice Authentication in the Deepfake Era

Securing Voice Authentication in the Deepfake Era 

Deepfake technology using AI algorithms can now generate realistic voice deepfakes. We outline current vulnerabilities…
Learn more
Fun Free things to do at BlackHat

Fun Free Things to do at BlackHat 2023

We've collected the best free things (You might need your BlackHat pass) to do this…
Learn more
Barbie Phishing Scams

Phishing Alert: Don’t Fall for Barbie Movie Scams

Unravel the Dark Side of Barbie Movie Mania! Threat Actors exploit the frenzy, using phishing…
Learn more
SIM swapping Attacks

SIM Swapping Attacks Unmasked: Stay One Step Ahead

SIM swapping attacks involve threat actors gaining control over an individual's number, enabling identity theft….
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start