GuLoader

GuLoader Downloaded: A Look at the Latest Iteration

GuLoader stands out as a prominent downloader founded on shellcode that has been used in…
Learn more

Meta is down: Skynet and Other Groups Claim to Have Attacked

Learn more
abyss locker

Into the Depths of Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March…
Learn more
mssp

Cyberint’s MSSP FAQ: Your Questions Answered

We know how busy MSSP teams are now, so to save you time, we thought…
Learn more
The need for mssps to evolve and adapt

How MSSP Adaptivity Breeds Business Success

MSSPs face a real risk of becoming outdated – and losing out on customers and…
Learn more
the genesis of exodus logs market

The Genesis of “Exodus Logs Market”

There's a new marketplace in town. It goes by the name of "Exodus Market" and…
Learn more
A Guide to the 2 Main Types of Retail & E-Commerce Fraud

A Guide to the 2 Main Types of Retail & E-Commerce Fraud

There are two main types of retail and eCommerce fraud today: Fraudulent sites that mimic a…
Learn more
legal takedowns vs cyber takedowns

Legal Takedowns vs. Cyber Takedowns: What to Use When

Who should be in charge of takedowns – lawyers or cybersecurity teams. You need to…
Learn more
Operation Deface: A New Alliance of Hacktivists on Telegram

Operation Deface: A New Alliance of Hacktivists on Telegram 

There's a new Hacktivist Cyber Alliance including many threat actor groups including Anonymous, LulzSec, Lapsus…
Learn more
The expanded attack surface

Tackling the Surge: The Expanded Financial Attack Surface

Explore the evolving challenges in the financial attack surface, including risks like phishing, supply chain…
Learn more
azorult

Meet AZORult Stealer: High Risk, Open Source & Evolving

AZORult stealer is regarded as a high-risk Trojan-type virus. It has evolved into a free,…
Learn more
2024 threat landscape predictions

Cyberint’s 2024 Threat Landscape Predictions

The Cyberint Research Team forecasts the biggest threats of 2024. From supply chain to the…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start