Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

ProxyNotShell-Microsoft Exchange Vulnerabilities

On September 29, Microsoft Security Threat Intelligence reported two significant zero-day vulnerabilities being exploited in…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

SmokeLoader Delivers the New Erbium Stealer

Over the past few months, a new info stealer has emerged developed by an underground…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

Discord – Fundamentals and Threats

In a world where more and more communities and businesses are based on instant messaging…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

LockBit3.0 Leak

Ever since Conti’s leaks, Lockbit overtook the ransomware throne without any intention of going down…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

TikTok Breached by BlueHornet

The breach of the popular social network TikTok occurred, revealing 1.7 billion records and relations…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

Offensive Security Migrates to The Underground

As offensive security companies emerged almost at the same rate as ransomware groups, some states…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

China-Taiwan Threat Intelligence Landscape

During the past couple of months, the tension between China and Taiwan increased dramatically, the…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

No Service Is Safe – Atlassian Demands Increasing

Compromised Atlassian credentials increased by 337% thus Atlassian services serve as the gateway to the…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

Cookie O’clock

MFA can be bypassed by a small piece of information stored on the local computer…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

GhostSec Raising the Bar

In June 2022, Cyberint observed a new hacktivist campaign targeting multiple Israeli organizations and enterprises…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

Atlas Intelligence Group (A.I.G) – The Wrath of a Titan

What makes Atlas Intelligence Group unique is its recruitment of cyber-mercenaries to do specific jobs…
Learn more
Please add thumbnail or "No Thumbnail Image" if you have no thumbnail (see theme options)

Ransomware Landscape Q2 2022

Although many incidents and stories might stick out when summarizing this quarter, the most important…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start