Active Exposure Validation

The ROI of Active Exposure Validation

What is Active Exposure Validation (AEV) and how does it help with EASM detection and…
Learn more
Integration blog

Cyberint’s Integration with Check Point: Challenges and Endless Possibilities

How does the Check Point acquisition of Cyberint help both products provide world-class security
Learn more

The Vision Leading to Check Point’s Acquisition of Cyberint

Learn more
csf 2.0

What’s New in CSF 2.0? (NIST)

Function How Cyberint Aligns Govern Reporting and creating a policy is based on risk assessment….
Learn more
cyberint's on call assistant

An Insight Into the Tech: Revolutionizing Cyberint’s On-Call Operations

At Cyberint, we’re always on the lookout for out-of-the-box solutions to enhance our operational efficiency…
Learn more
The Cybersecurity Risks of .ZIP Domains

The Phishing Risks & Implications of .ZIP Domains

Google's introduction of ZIP top-level domains has ignited a debate about security risks. But are…
Learn more
New Emotet Technique

Avoid Taking Shortcuts – New Emotet Technique

Emotet, one of the first Malware-as-a-Service (MaaS), an ever-evolving botnet and banking trojan active since…
Learn more

Monthly Cyber Vulnerability Bulletin – November 2021

During the past month, the following notable high-severity vulnerabilities have been observed. It is recommended…
Learn more

Atlassian Confluence Server OGNL Injection (CVE-2021-26084)

Cyberint Research – companies using Atlassian Confluence should take immediate action to mitigate the impact…
Learn more

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…
Learn more

Widespread Website Outages – Fastly CDN

Cyberint Research team takes a look at the recent Fastly CDN outage and how it…
Learn more

Colonial Pipeline Incident

Another high-impact and high-profile ransomware incident, 'DarkSide' accepted responsibility for an attack against the US-based…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start