The New Infostealer in Town: The Continental Stealer

The New InfoStealer in Town: The Continental Stealer

In the last several days, a new info stealer known as the "Continental stealer" has…
Learn more
cve 2023-46747

The Discovery of F5 BIG-IP Vulnerability CVE-2023-46747

CVE-2023-46747, has been discovered in the widely used F5 BIG-IP Configuration Utility. This vulnerability has…
Learn more
venom control RAT with a sting

Venom Control–RAT With a Sting

Over the past year, an allegedly legitimate software company named Venom Control Software emerged, offering…
Learn more
Okta Breach

What You Need to Know About the October OKTA Breach

Okta, reported that threat actors were able to access private customer data by obtaining credentials…
Learn more
AI Trick or Threat

A.I – Trick or T(h)reat? 

We examine the developments in AI tech, impact on cybersecurity including Dark GPT tools, malware…
Learn more
Subdomain Hijacking: The Domain's Silent Danger

Subdomain Hijacking: The Domain’s Silent Danger  

Over 1,000 orgs were found to have subdomains at risk of hijacking, but this is…
Learn more
US Threat Landscape in 2023

The U.S. Threat Landscape in 2023

From info stealers to ransomware we cover the latest TTPs targeting US businesses. We look…
Learn more
The Five Families Telegram Channel

New Cyber Alliance: The Five Families Telegram Channel 

Cyberint discovered a new Telegram channel called "The Five Families," joining together 5 distinct threat…
Learn more
desorden group

Desorden Group – The Summer 2023 Update

The financially motivated Desorden (Disorder in Spanish) group, previously known as “chaoscc”, was first observed…
Learn more
Android Malware starter pack

Chapter 1: Android Malware Starters Pack

We review the fundamentals of Android threats to understand what’s under the hood of Android…
Learn more
Whose Behind the Cloak: Cloak Ransomware

Cloak Ransomware: Who’s Behind the Cloak?   

A new ransomware group has emerged, Cloak Ransomware. Learn about their TTPs, recent attacks and…
Learn more
GhostSec Iranian Surveillance Software

GhostSec’s Revelation of Iranian Surveillance Software 

GhostSec has reported a successful breach of the FANAP Behnama software, which they describe as…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start