Securing Voice Authentication in the Deepfake Era

Securing Voice Authentication in the Deepfake Era 

Deepfake technology using AI algorithms can now generate realistic voice deepfakes. We outline current vulnerabilities…
Learn more
Barbie Phishing Scams

Phishing Alert: Don’t Fall for Barbie Movie Scams

Unravel the Dark Side of Barbie Movie Mania! Threat Actors exploit the frenzy, using phishing…
Learn more
How Threat Intelligence Drives Efficiency in an Economic Downturn

How Threat Intelligence Drives Efficiency in an Economic Downturn

Increased scrutiny of security & tighter budgets mean cyber strategies need a revamp. See how…
Learn more
Compromised Credentials: Tactics, Risks, Mitigation

Compromised Credentials: Tactics, Risks, Mitigation

The theft of users' credentials is a growing industry. In this blog we cover their…
Learn more
Malvertising: How Phishing Campaigns Use Malicious Ads

Malvertising: How Phishing Campaigns Use Malicious Ads

In the blog we cover the latest malvertising tactics and 4 key ways to combat…
Learn more
Supply Chain Intelligence Can't Be Static: Here's Why

Supply Chain Intelligence Can’t Be Static: Here’s Why

Traditional Supply Chain Intelligence has it's weaknesses including the fact that it is static, misses…
Learn more
where does the attack surface end

Where does the Attack Surface end? 

Why is it necessary for security leaders to adopt a broader conception of the attack…
Learn more

Top 5 Cyber Risk Mitigation Strategies For The Finance Industry 

Cybersecurity isn’t easy in any industry, but it is perhaps most challenging for the banking,…
Learn more

The Evolution From Actionable Threat Intelligence To Impactful

In the world of cybersecurity, it’s widely understood that threat intelligence must be “actionable.” Although…
Learn more
Protect from Phishing Attacks

Five Steps to Protect Your Organization against Phishing Attacks

Staying ahead of cybercriminals requires proactive and strategic security measures
Learn more
Conti Best Practices

Conti’s 12 Commandments of Cyber Security

Cyberint’s research team shed light on cyber security instructions for new members recruited to the…
Learn more
Automotive Industry Glance

Subscription Payment Models Adopted by Car Manufacturers as a Precursor to Supply-Chain Attacks

Recent trends indicate that the automotive industry subscription plans resemble more to microtransaction models…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start