The InfoStealer Lifecycle: A Look At The Attack Process From End-to-End 

Malware is not a new attack vector but, over the past few years, the Cyberint research team was observed a resurgence of this threat. In particular, a specific type of malware known as InfoStealers has become a serious risk.  This blog post will drill down on InfoStealers and discuss the lifecycle of an InfoStealer attack, […]

Continue reading

The InfoStealer Lifecycle: A Look At The Attack Process From End-to-End 

Malware is not a new attack vector but, over the past few years, the Cyberint…
Learn more

Nevada Ransomware Campaign

Update from February 10th, 2023: In the early days of this campaign, Nevada was the…
Learn more

Hive Shutdown Incident

Executive Summary Ransomware is one of the most painful threats to organizations worldwide. As this…
Learn more

Cyberint Mentioned in Three 2022 Gartner® Reports

We are proud to announce that Cyberint has been named a Sample Vendor in the…
Learn more

Cyber Threats on Sale – A Black Friday Special Intelligence Report

INTRODUCTION Threats to the e-commerce industry have increased in the last year as multiple threat…
Learn more

Guacamaya Group

The Guacamaya group is a fairly new hacktivist group based in Latin America. The group…
Learn more
Ransomware Landscape Q3

Q3 Ransomware Landscape Report

Q3 of 2022 has provided us with many interesting insights into the ransomware industry with…
Learn more
ProxyNotShell-Microsoft Exchange Vulnerabilities

ProxyNotShell-Microsoft Exchange Vulnerabilities

On September 29, Microsoft Security Threat Intelligence reported two significant zero-day vulnerabilities being exploited in…
Learn more
Erbium

SmokeLoader Delivers the New Erbium Stealer

Over the past few months, a new info stealer has emerged developed by an underground…
Learn more

Discord – Fundamentals and Threats

In a world where more and more communities and businesses are based on instant messaging…
Learn more

LockBit3.0 Leak

Ever since Conti’s leaks, Lockbit overtook the ransomware throne without any intention of going down…
Learn more

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start