Recent Supply Chain Attacks Examined

The Weak Link: Recent Supply Chain Attacks Examined

We examine the recent supply chain attack growth, especially in 2022/3, the evolution of TTPs,…
Learn more
ra group

The Uptick in RA Group Ransomware’s Activity

The actor is rapidly expanding its operations. RA Group opened its data leak site on…
Learn more
ransomware recap

Ransomware Trends 2023 Report

With Q4 2023 showing an unprecedented number of attacks, we tell you what ransomware trends…
Learn more
Qilin Ransomware

Qilin Ransomware: Get the 2024 Lowdown

Qilin operates as an affiliate program for Ransomware-as-a-Service, employing a Rust-based ransomware to target victims….
Learn more
abyss locker

Into the Depths of Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March…
Learn more
azorult

Meet AZORult Stealer: High Risk, Open Source & Evolving

AZORult stealer is regarded as a high-risk Trojan-type virus. It has evolved into a free,…
Learn more
2024 threat landscape predictions

Cyberint’s 2024 Threat Landscape Predictions

The Cyberint Research Team forecasts the biggest threats of 2024. From supply chain to the…
Learn more
top financial organizations cyber risks

The Top Financial Organization Cyber Risks of 2024

The top 3 cyber risks for banks, FinTech, Insurance and credit card companies. Ranging from…
Learn more
Rhadamanthys

Blink-and-Update: All About Rhadamanthys Stealer

All you need to know about Rhadamanthys, an info stealer, written in C++, that was…
Learn more
PLAY Ransomware

Are They Really Playing? Get to Know Play Ransomware

Play Ransomware is a recent entrant into the ransomware industry, with its initial appearance in…
Learn more
beast ransomware

The Nature of the Beast Ransomware

Introducing the next evolution of Monster Ransomware, Beast Ransomware. This ransomware has yet to gain…
Learn more
snatch ransomware

Snatch Ransomware: Digital Cat and Mouse

The perpetrators behind Snatch Ransomware have persistently adapted their strategies. See how they have evolved…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start