Ransomware Trends 2023 Report

ransomware report 2023

With Q4 2023 showing an unprecedented number of attacks, we tell you what ransomware trends you need to know and what groups you need to watch.

Continue reading
Beyond the Mask of Anonymous Sudan

Behind the Mask of Anonymous Sudan: An Analysis

An in depth analysis of Anonymous Sudan, including main targets, TTPs, suspected origins and more.
Learn more
CVE 2023-22518

Critical Confluence Vulnerability – CVE-2023-22518 

All the latest information on CVE-2023-22518 including risk, whether threat actors are exploiting it and…
Learn more
bianlin ransomware

BianLian Ransomware: Victimology and TTPs

We deep dive into the BianLian Ransomware looking at who they target how they target…
Learn more
Israel-Hamas vs Russia-Ukraine

Israel-Hamas vs. Ukraine-Russia War

There are many similarities between the Israel-Hamas war and the Ukraine-Russia war, but there are…
Learn more
From Clicks to Chaos: The Rise of Crowd-Sourced Cyber Attacks 

From Clicks to Chaos: The Rise of Crowd-Sourced Cyber Attacks 

Guerrilla Warfare Tactics are increasingly being used during cyber warfare. See how crowd-sourced cyber attacks…
Learn more
Atlassian releases 4 critical patches

Atlassian Releases Four Critical Patches to Prevent RCE 

Atlassian released software fixes to address 4 critical flaws that, if successfully exploited, could result…
Learn more
the lumma stealer infostealer

The Lumma Stealer InfoStealer: The Details

Lumma Stealer was initially identified in August 2022. Its specifically crafted to illicitly obtain sensitive…
Learn more
the risks of smartphone and mfa usage in organizations

The Risks of Smartphone and MFA Usage in Organizations

Figure 1: Fake MFA apps on Apple App Store
Learn more
top asian cyber threats

Top Asian/APAC Cybersecurity Threats of 2023

Cyberint details the top 7 threats to the Asia/APAC region. To protect against cyber threats…
Learn more
vulnerability management and threat intelligence

Vulnerability Management Needs Threat Intelligence: Here’s How To Combine Them 

Immediate risks are caused by CVEs in the software/services running in your external attack surface….
Learn more
holiday phishing

Why Scammers Love the Holidays, and How to Stop Holiday Phishing Risks

Cyberint has observed a 46% rise in phishing attacks over the holiday season. Cyberint detail…
Learn more
Getting to know DCRat

Getting to Know DCRat

DCRat, known as Dark Crystal Rat operates as a modular RAT offered as a MaaS…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start