XFiles Stealer Campaign Abusing Follina

XFiles Stealer Campaign Abusing Follina

XFiles Stealer Campaign Abusing Follina

As many threat actors and groups seek to utilize recently discovered vulnerabilities, the Cyberint Research Team found several XFiles stealer campaigns, in which Follina vulnerability was exploited as part of the delivery phase.

Continue reading
Protect from Phishing Attacks

Five Steps to Protect Your Organization against Phishing Attacks

Staying ahead of cybercriminals requires proactive and strategic security measures
Conti Best Practices

Conti’s 12 Commandments of Cyber Security

Cyberint’s research team shed light on cyber security instructions for new members recruited to the…
Automotive Industry Glance

Subscription Payment Models Adopted by Car Manufacturers as a Precursor to Supply-Chain Attacks

Recent trends indicate that the automotive industry subscription plans resemble more to microtransaction models…

4 Steps To Lower Your Digital Risk

Read on for four actionable ways to protect against digital risk and ensure that cyber…

Why Digital Risk Protection on Social Media is a Must For Online Retailers

Cybercriminals are taking full advantage of businesses' reliance on social media. How can organizations best…
Why Your Brand Protection Relies on Threat Intelligence?

Why Your Brand Protection Relies on Threat Intelligence

Your brand is the image your customers have of your business; this is what makes…

How Threat Intelligence Could Have Helped Prevent 2020’s Cybersecurity Incidents

If anyone has benefitted from the pandemic, it's cyber attackers. Cyberattacks have dramatically increased. Could…

Beyond Digital Risk Protection: Meet the Experts

Meet the experts that take Cyberint beyond regular Digital Risk Protection. Learn about cyberattacks on…

Reactive vs Proactive: Hunting for Threats with Targeted Cyber Threat Intelligence

The average time to detect a cyber security breach is over 200 days. Learn how…

Part 3: Protecting The Customer Journey: Learning from 2019’s High Profile Breaches and Attacks

Threat actors are known to target all parts of the complex customer journey. We look…

How to Increase your Organization’s Cyber Resilience

As organizations in all sectors increase their digital presence, they become increasingly vulnerable to cyber…

How Your Customer’s User Journey Influences Cyber Resilience

Learn the specific vulnerabilities and threats that online retailers and their customers face throughout each…