Aligning with the NCSC Cyber Assessment Framework

ncsc caf

Explore how Cyberint, now a Check Point company, helps organisations align with the NCSC Cyber Assessment Framework (CAF), supporting essential services with threat intelligence, external risk visibility, and real-time threat detection.

Continue reading
5 biggest feature additions in 2024

The 5 Biggest Feature Additions to Cyberint in 2024

From a new risk dashboard to a new takedown request tracking screen see what we…
Learn more
alon davidoff third party sites credentials

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often sign up with a corporate email address on 3rd party sites. However, this…
Learn more
Active Exposure Validation

The ROI of Active Exposure Validation

What is Active Exposure Validation (AEV) and how does it help with EASM detection and…
Learn more
Integration blog

Cyberint’s Integration with Check Point: Challenges and Endless Possibilities

How does the Check Point acquisition of Cyberint help both products provide world-class security
Learn more
instagram brand protection

Instagram Brand Protection: Strategies to Safeguard Your Business

Instagram impersonation is causing serious financial and reputational harm to businesses. Cyberint looks at what…
Learn more
pig butchering

The Rise of Pig Butchering Scams

Figure 1: FBI report highlights a significant rise in both the number of complaints and…
Learn more
retail threat landscape

Retail Threat Landscape 2024

Figure 3: GitHub Comments Distributing Malware Hosted on Microsoft’s Official GitHub Repository Figure 4: Top…
Learn more
Finastra Breach

Finastra Breach: Findings and Summary

Figure 1: Screenshot of the original post Figure 2: Screenshot of sample data from the…
Learn more
Akira Ransomware

Akira Ransomware: Published Over 30 New Victims on their DLS

Akira, a rising ransomware-as-a-service star was discovered in March 2023. Since then its victim count…
Learn more
Coral

Not Your Grandfather’s Hacktivists: How Hacktivism Has Evolved

Fig 1: Crowd Sourcing to campaign against Israel Fig 2: Crowdsourcing to campaign against Russia…
Learn more
How will NIST CSF 2.0 Impact Everyone?

How Will the NIST CSF Framework 2.0 Impact Everyone?

Quote Box “The CSF 2.0 brings tremendous value to organizations, especially around guidance and optimizing,…
Learn more
dw monitoring

Dark Web monitoring: The linchpin of External Risk Management

Figure 1: A phishing kit found with Cyberint Figure 2: Screenshot of Cyberint providing leaked…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start