2022 Cybersecurity Predictions

Cyberint Research Team will try and shed some light on the upcoming year: the key security risks and threats, and what we feel will change in the coming year.

Continue reading
Conti Ransomware Leaks

To Be CONTInued? Conti Ransomware Heavy Leaks

Conti has suffered immeasurable damage caused by this massive leak, both professionally
stand with ukraine

Historical Cyber Warfare – Russia vs Ukraine

Cyber aspect of the conflict includes every type of warfare, including state-sponsored groups, ransomware groups,…
Mars Stealer

Like Father Like Son? New Mars Stealer

Mars is an information stealer mainly targeting Windows victim credentials and cryptocurrency wallets including 2FA…
AvosLocker

AvosLocker – the Rising Star of Ransomware

AvosLocker is a relatively new ransomware written in C++ that was first seen in June…
Jester Stealer

How About a Magic Trick? A New Jester In Court

Over the past months, Cyberint Research Team observed a new group that emerged on several…

2022 Cybersecurity Predictions

Cyberint Research Team will try and shed some light on the upcoming year: the key…
Automotive Industry Glance

Subscription Payment Models Adopted by Car Manufacturers as a Precursor to Supply-Chain Attacks

Recent trends indicate that the automotive industry subscription plans resemble more to microtransaction models…
Ransomware 2021 Cyberint Research Report

Ransomware 2021 – The Bad, The Bad & The Ugly

Ransomware remains a growing and increasingly problematic threat to organizations across all industries.
Log4j Incident Update – Dramatic Turn of Events

Log4j Incident Update – Dramatic Turn of Events

In a matter of hours malware families have already started using the log4j vulnerability as…
Log4J2 Remote Code Execution

CVE-2021-44228: Log4J2 Remote Code Execution

On Dec. 9, 2021, a remote code execution (RCE) vulnerability in Apache log4j 2 was…
Cyberint Research - Emotet Returns

Emotet is Back in the Game

Emotet is a Malware-as-a-Service (MaaS) that used to operate as a trojan targeting banks in…
Phishing operators abuse bank APIs to improve phishing TTPs

Phishing operators abuse bank APIs to improve phishing TTPs

True login kit developers are abusing publicly available APIs of the banking company to be…