csf 2.0

What’s New in CSF 2.0? (NIST)

Function How Cyberint Aligns Govern Reporting and creating a policy is based on risk assessment….
Learn more

Meet UULoader: An Emerging and Evasive Malicious Installer.

Figure 1 – UULoader .pdb path. Figure 2 – Executable missing its MZ/PE header. Figure…
Learn more
ransomhub

RansomHub: The New Kid on the Block to Know

Figure 1: RansomHub Data Leak Site Home page Figure 2: RansomHub publishes data of victims…
Learn more
olympics cybercriminals

OLYMPICS 2024: When Cybercriminals Enter the Arena

As the Paris 2024 Summer Olympics approaches, concerns have surfaced over the heightened threat of…
Learn more
2024 needs a new approch dark web monitoring

Why 2024 Requires a New Approach to Dark Web Monitoring 

Dark Web Usage Trends such as increased forum turnover, increased app usage and more requires…
Learn more
crowdstrike hack

Microsoft Outage Due to CrowdStrike Update

rowdStrike released a new update on their Falcon Sensor product. Unfortunately, the update caused technical…
Learn more
handala hack

Handala Hack: What We Know About the Rising Threat Actor

The Handala Hacker Group takes its name and symbol from Handala, and they have a…
Learn more
how big is too pic of a password list

How Big is Too Big (Of a Password List)? An Analysis of the RockYou2024 Password Leak

This most recent incarnation of the “RockYou” lists, dubbed “rockyou2024.txt”, has been uploaded. But how…
Learn more
telegram monitoring

Why and how to perform Telegram monitoring to protect your business

For threat actors, the Telegram app, which emphasizes user privacy, has become a favored hangout….
Learn more
cve 2024-6387

CVE-2024-6387 – RCE Vulnerability in OpenSSH

A high-severity remote code execution (RCE) vulnerability, CVE-2024-6387, has been discovered in OpenSSH’s server
Learn more
remcos rat

What You Need to Know About Remcos RAT

Remcos is a form of malware presented as legitimate software, purportedly useful for surveillance and…
Learn more
b1ack stash

B1ACK’S STASH: A Comprehensive Analysis of the Free 1 Million Card Leak 

Is B1ACK STASH's 1 Million card lead real? The Cyberint team analysed the leak and…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start