Ransomware Groups Report 2024 – Q2

q2 ransomware report

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well as top families and targeted sectors and countries.

Continue reading
revolutionizing cyberint's on call operations

An Insight Into the Tech: Revolutionizing Cyberint’s On-Call Operations

At Cyberint, we’re always on the lookout for out-of-the-box solutions to enhance our operational efficiency…
Learn more
The Cybersecurity Risks of .ZIP Domains

The Phishing Risks & Implications of .ZIP Domains

Google's introduction of ZIP top-level domains has ignited a debate about security risks. But are…
Learn more
New Emotet Technique

Avoid Taking Shortcuts – New Emotet Technique

Emotet, one of the first Malware-as-a-Service (MaaS), an ever-evolving botnet and banking trojan active since…
Learn more

Monthly Cyber Vulnerability Bulletin – November 2021

During the past month, the following notable high-severity vulnerabilities have been observed. It is recommended…
Learn more

Atlassian Confluence Server OGNL Injection (CVE-2021-26084)

Cyberint Research – companies using Atlassian Confluence should take immediate action to mitigate the impact…
Learn more

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…
Learn more

Widespread Website Outages – Fastly CDN

Cyberint Research team takes a look at the recent Fastly CDN outage and how it…
Learn more

Colonial Pipeline Incident

Another high-impact and high-profile ransomware incident, 'DarkSide' accepted responsibility for an attack against the US-based…
Learn more

Ryuk Crypto-Ransomware

A typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached…
Learn more

Back Me Up – Hacking Android Apps without Root

Noy Pearl of Cyberint on pentesting Android apps that doesn't require root access.
Learn more

Threat Hunting with The MITRE ATT&CK™ Framework

Efficient cybersecurity requires a threat-focused vision to ensure business continuity. This blog introduces MITRE ATT&CK…
Learn more

Awarding Cyberint’s Security Efforts

CyberInt researchers are being recognized for their hard work helping companies detect cyber attacks that…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start