Why Your Brand Protection Relies on Threat Intelligence?

Why Your Brand Protection Relies on Threat Intelligence

Why Your Brand Protection Relies on Threat Intelligence?

Your brand is the image your customers have of your business; this is what makes your brand into such a valuable asset and why threat intelligence is key.

Continue reading

Monthly Vulnerability Bulletin – November 2021

Atlassian Confluence Server OGNL Injection (CVE-2021-26084)

Cyberint Research – companies using Atlassian Confluence should take immediate action to mitigate the impact…
Conti Ransomware

IOC’s identified to hunt Conti Ransomware

Conti Ransomware manuals & software archive was leaked. Check out indicators of compromise (IOC) revealed…

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…

Widespread Website Outages – Fastly CDN

Cyberint Research team takes a look at the recent Fastly CDN outage and how it…

Colonial Pipeline Incident

Another high-impact and high-profile ransomware incident, 'DarkSide' accepted responsibility for an attack against the US-based…

Dell Firmware Update Driver Vulnerability CVE-2021-21551

High severity vulnerabilities in Dell's firmware update driver were published & could lead to privilege…

CL0P Ransomware

Utilizing common 'steal, encrypt and leak' tactics, victims failing to meet CL0P group ransom demands…

Ryuk Crypto-Ransomware

A typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached…

Back Me Up – Hacking Android Apps without Root

Noy Pearl of Cyberint on pentesting Android apps that doesn't require root access.

Threat Hunting with The MITRE ATT&CK™ Framework

Efficient cybersecurity requires a threat-focused vision to ensure business continuity. This blog introduces MITRE ATT&CK…

Awarding CyberInt’s Security Efforts

CyberInt researchers are being recognized for their hard work helping companies detect cyber attacks that…