David Geclowicz

A Guide to NIS 2 Requirements and How Cyberint Helps Meet Them

Here's what organizations that manage or depend on critical infrastructure need to know about NIS…
Learn more
open bullet 2

Open Bullet 2: A Tool for Credential Stuffing Attacks

Open Bullet 2 is a web testing tool, but it's become popular with hackers using…
Learn more
cryptocurrency on the underground

Cryptocurrency on the Underground 

Cryptocurrency has significantly disrupted the economic landscape. But, the market's vulnerabilities & limited oversight allowed…
Learn more
Qilin Ransomware

Qilin Ransomware: Get the 2024 Lowdown

Qilin operates as an affiliate program for Ransomware-as-a-Service, employing a Rust-based ransomware to target victims….
Learn more
Ramadan op israel

The Ramadan Fast: A Possible Wave of Cyber Attacks Against Israeli Targets

OpIsrael has become a year-round campaign that shifts to high gear around substantial events such…
Learn more
GuLoader

GuLoader Downloaded: A Look at the Latest Iteration

GuLoader stands out as a prominent downloader founded on shellcode that has been used in…
Learn more

Meta is down: Skynet and Other Groups Claim to Have Attacked

Learn more
abyss locker

Into the Depths of Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March…
Learn more
mssp

Cyberint’s MSSP FAQ: Your Questions Answered

We know how busy MSSP teams are now, so to save you time, we thought…
Learn more
The need for mssps to evolve and adapt

How MSSP Adaptivity Breeds Business Success

MSSPs face a real risk of becoming outdated – and losing out on customers and…
Learn more
the genesis of exodus logs market

The Genesis of “Exodus Logs Market”

There's a new marketplace in town. It goes by the name of "Exodus Market" and…
Learn more
A Guide to the 2 Main Types of Retail & E-Commerce Fraud

A Guide to the 2 Main Types of Retail & E-Commerce Fraud

There are two main types of retail and eCommerce fraud today: Fraudulent sites that mimic a…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start