Why Your Brand Protection Relies on Threat Intelligence?

Why Your Brand Protection Relies on Threat Intelligence

Why Your Brand Protection Relies on Threat Intelligence?

Your brand is the image your customers have of your business; this is what makes your brand into such a valuable asset and why threat intelligence is key.

Continue reading
2022 Cybersecurity Predictions

2022 Cybersecurity Predictions

Cyberint Research Team will try and shed some light on the upcoming year: the key…
Ransomware 2021 Cyberint Research Report

Ransomware 2021 – The Bad, The Bad & The Ugly

Ransomware remains a growing and increasingly problematic threat to organizations across all industries.
Log4j Incident Update – Dramatic Turn of Events

Log4j Incident Update – Dramatic Turn of Events

In a matter of hours malware families have already started using the log4j vulnerability as…
Log4J2 Remote Code Execution

CVE-2021-44228: Log4J2 Remote Code Execution

On Dec. 9, 2021, a remote code execution (RCE) vulnerability in Apache log4j 2 was…
Cyberint Research - Emotet Returns

Emotet is Back in the Game

Emotet is a Malware-as-a-Service (MaaS) that used to operate as a trojan targeting banks in…
Vidar Stealer Abuses Mastadon Social Network

Vidar Stealer Abuses Mastadon Social Network

First seen in October 2018, Vidar is a descendent of the former Arkei Stealer, which…

MSHTML RCE Exploited CVE-2021-40444

New vulnerability has been exploited through the delivery of a MS Office document utilizing an…

Masslogger Stealer

Masslogger is a .NET credential stealer available on cybercriminal forums for $100, now targeting manufacturing…

Redline Stealer

Redline is a Malware-as-a-Service information stealer that targets Windows' credentials & cryptocurrency wallets, and can…

LockBit Ransomware hits again

LockBit is a ransomware-as-a-service (RaaS) threat that was recently used to attack Accenture, a multinational…
Conti Ransomware

IOC’s identified to hunt Conti Ransomware

Conti Ransomware manuals & software archive was leaked. Check out indicators of compromise (IOC) revealed…

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…