Attending InfoSec?

How Threat Intelligence Drives Efficiency in an Economic Downturn

How Threat Intelligence Drives Efficiency in an Economic Downturn

How Threat Intelligence Drives Efficiency in an Economic Downturn

Increased scrutiny of security & tighter budgets mean cyber strategies need a revamp. See how vulnerability threat intelligence tool consolidation helps

Continue reading
New Emotet Technique

Avoid Taking Shortcuts – New Emotet Technique

Emotet, one of the first Malware-as-a-Service (MaaS), an ever-evolving botnet and banking trojan active since…
Learn more

Monthly Cyber Vulnerability Bulletin – November 2021

During the past month, the following notable high-severity vulnerabilities have been observed. It is recommended…
Learn more

Atlassian Confluence Server OGNL Injection (CVE-2021-26084)

Cyberint Research – companies using Atlassian Confluence should take immediate action to mitigate the impact…
Learn more

PetitPotam – NTLM Relay Attack

PetitPotam is a tool used for NTLM relay attacks that grants threat actors the ability…
Learn more

Widespread Website Outages – Fastly CDN

Cyberint Research team takes a look at the recent Fastly CDN outage and how it…
Learn more

Colonial Pipeline Incident

Another high-impact and high-profile ransomware incident, 'DarkSide' accepted responsibility for an attack against the US-based…
Learn more

CL0P Ransomware

Utilizing common 'steal, encrypt and leak' tactics, victims failing to meet CL0P group ransom demands…
Learn more

Ryuk Crypto-Ransomware

A typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached…
Learn more

Back Me Up – Hacking Android Apps without Root

Noy Pearl of Cyberint on pentesting Android apps that doesn't require root access.
Learn more

Threat Hunting with The MITRE ATT&CK™ Framework

Efficient cybersecurity requires a threat-focused vision to ensure business continuity. This blog introduces MITRE ATT&CK…
Learn more

Awarding Cyberint’s Security Efforts

CyberInt researchers are being recognized for their hard work helping companies detect cyber attacks that…
Learn more

Russian Threat Group TA505 is Out Phishing: Hijacks Legitimate Remote Access Tools

Russian “TA505” group has been using spear-phishing campaigns to make money. Here is what you…
Learn more

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start