Aligning with the NCSC Cyber Assessment Framework

ncsc caf

Explore how Cyberint, now a Check Point company, helps organisations align with the NCSC Cyber Assessment Framework (CAF), supporting essential services with threat intelligence, external risk visibility, and real-time threat detection.

Continue reading
Telegram ChANGES SHAKE CYBER CRIMINALS

Telegram Changes Shake Cyber Criminals

Querying the bot yielded no results A threat actor posted a thread in Cracked, a…
Learn more
europe threat landscape

Europe Threat Landscape Report

Critical Alerts by Industry Oct 2021-2024 Compromised Vendor Industry Date Incident Type ServiceNow I.T. and…
Learn more
q3 2024 ransomware report

Ransomware Groups Report 2024 – Q3

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well…
Learn more

Why Scammers Love the Holidays, and How to Stop Holiday Phishing Risks

Cyberint has observed a 46% rise in phishing attacks over the holiday season. Cyberint detail…
Learn more
meow ransomware

Is MEOW Ransomware Getting Its Claws Out?

Figure 1: Buying options on Meow Leaks Figure 2: 'mleaks' user on exploit forum Figure…
Learn more
major x accounts hack fizzles

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

Learn more
top 4 attack vectors in LATAM

The 4 Most Common Attack Vectors in LATAM 

A phishing page
Learn more
mssp customer abandonment

Solving MSSP Customer Abandonment Challenges by Choosing the Right MSSP Software

Styled Text "Cutting your prices to match the bargain bin might win you a sprint,…
Learn more
cybersecurity platform consolidation

Cybersecurity Platform Consolidation: The Key to Enhanced Protection at a Lower Cost

Learn more
why mssps are short on good external risk management tools

Why MSSPs Are Short on Good External Risk Management Tools

Learn more
A deep dive into initial access brokers

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Figure 1: United States corporation offered for sale on the underground Figure 6: Average Revenue…
Learn more

The Vision Leading to Check Point’s Acquisition of Cyberint

Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start