Get a Demo

Aligning with the NCSC Cyber Assessment Framework

ncsc caf

Explore how Cyberint, now a Check Point company, helps organisations align with the NCSC Cyber Assessment Framework (CAF), supporting essential services with threat intelligence, external risk visibility, and real-time threat detection.

Continue reading
Zestix

Zestix Threat Actor Profile | TTPs, Victims, and Breach Activity

An overview of Zestix, a criminal threat actor active since 2025, detailing victimology across transportation…
Learn more
The Targeted Exploitation of Philippine Rural Banking

The Targeted Exploitation of Philippine Rural Banking

Check Point analysts have identified a persistent defensive maturity gap within the Philippine rural banking…
Learn more
Payroll Pirates

Payroll Pirates: The Widespread Malvertising Network

A Deep Dive into an extensive malvertising campaign targeting US banks, credit unions and more.
Learn more
The Great NPM Heist – September 2025

The Great NPM Heist – September 2025

The Sept 2025 npm breach: 18+ packages, 2B+ weekly downloads, and crypto-stealing malware. We break…
Learn more
team fearless

Mapping Attacks by TEAM FEARLESS

Explore TEAM Fearless: A hacktivist group's cyber operations, TTPs, global targets, and dark web presence.
Learn more
DarkComert RAT

Decoding DarkComet’s (RAT) Shadow

Meet the RAT DarkComet. See its TTPs, some of its IOCs and more
Learn more
handala hack

Handala Hack: What We Know About the Rising Threat Actor

The Handala Hacker Group takes its name and symbol from Handala, and they have a…
Learn more
Europe Threat Landscape

Europe Retail Threat Landscape 2024

What do retailers in Europe need to know about the current threat landscape. We cover…
Learn more
social media poisoning

Toxins in the Community: Recent Social Media Poisoning Campaigns in the Philippines

Philippines: Social media scams rising. Fake loans, jobs offered via Meta ads. Learn how to…
Learn more
philippine threat landscape

Philippine Threat Landscape Report 2024-2025

An overview of the Philippine threat landscape for 2024-5 covering phishing trends, ransomware and more
Learn more
Finastra Breach

Finastra Breach: Findings and Summary

Figure 1: Screenshot of the original post Figure 2: Screenshot of sample data from the…
Learn more
top 4 attack vectors in LATAM

The 4 Most Common Attack Vectors in LATAM 

A phishing page
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start