Cyberint Mentioned in Three 2022 Gartner® Reports

We are proud to announce that Cyberint has been named a Sample Vendor in the ‘Hype Cycle for Security Operations, 2022

Continue reading
New Emotet Technique

Avoid Taking Shortcuts – New Emotet Technique

Emotet, one of the first Malware-as-a-Service (MaaS), an ever-evolving botnet and banking trojan active since…
Learn more

Monthly Cyber Vulnerability Bulletin – November 2021

During the past month, the following notable high-severity vulnerabilities have been observed. It is recommended…
Learn more

Atlassian Confluence Server OGNL Injection (CVE-2021-26084)

Cyberint Research – companies using Atlassian Confluence should take immediate action to mitigate the impact…
Learn more

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…
Learn more

Widespread Website Outages – Fastly CDN

Cyberint Research team takes a look at the recent Fastly CDN outage and how it…
Learn more

Colonial Pipeline Incident

Another high-impact and high-profile ransomware incident, 'DarkSide' accepted responsibility for an attack against the US-based…
Learn more

CL0P Ransomware

Utilizing common 'steal, encrypt and leak' tactics, victims failing to meet CL0P group ransom demands…
Learn more

Ryuk Crypto-Ransomware

A typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached…
Learn more

Back Me Up – Hacking Android Apps without Root

Noy Pearl of Cyberint on pentesting Android apps that doesn't require root access.
Learn more

Threat Hunting with The MITRE ATT&CK™ Framework

Efficient cybersecurity requires a threat-focused vision to ensure business continuity. This blog introduces MITRE ATT&CK…
Learn more

Awarding Cyberint’s Security Efforts

CyberInt researchers are being recognized for their hard work helping companies detect cyber attacks that…
Learn more

Russian Threat Group TA505 is Out Phishing: Hijacks Legitimate Remote Access Tools

Russian “TA505” group has been using spear-phishing campaigns to make money. Here is what you…
Learn more

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start