Get a Demo

Aligning with the NCSC Cyber Assessment Framework

ncsc caf

Explore how Cyberint, now a Check Point company, helps organisations align with the NCSC Cyber Assessment Framework (CAF), supporting essential services with threat intelligence, external risk visibility, and real-time threat detection.

Continue reading
crowdstrike hack

Microsoft Outage Due to CrowdStrike Update

rowdStrike released a new update on their Falcon Sensor product. Unfortunately, the update caused technical…
Learn more
cyber euro

The Cyber Threats Targeting the UEFA League – Euro 2024

From misconfigured DMARC records to Dark Web Chatter to Phishing Attacks, we cover the main…
Learn more

Japan Threat Landscape Report

As the fourth-largest economy worldwide, Japan stands as a pivotal center rendering its attack surface…
Learn more
the silent trade: russia's sanction evasion via parallel imports

The Silent Trade: Russia’s Sanction Evasion via Parallel Imports

Discover how Russia and Russian Threat Actors evade Western sanctions through parallel imports. Discover the…
Learn more
snowflake breach

Snowflake Breach: Examination of ‘whitewarlock’ claims

Snowflake has supposedly suffered a breach according to a Threat Actor known as ‘whitewarlock’ on…
Learn more
Ramadan op israel

The Ramadan Fast: A Possible Wave of Cyber Attacks Against Israeli Targets

OpIsrael has become a year-round campaign that shifts to high gear around substantial events such…
Learn more
Operation Deface: A New Alliance of Hacktivists on Telegram

Operation Deface: A New Alliance of Hacktivists on Telegram 

There's a new Hacktivist Cyber Alliance including many threat actor groups including Anonymous, LulzSec, Lapsus…
Learn more
the risks of smartphone and mfa usage in organizations

The Risks of Smartphone and MFA Usage in Organizations

Figure 1: Fake MFA apps on Apple App Store
Learn more
top asian cyber threats

Top Asian/APAC Cybersecurity Threats of 2023

Cyberint details the top 7 threats to the Asia/APAC region. To protect against cyber threats…
Learn more
Cyberint, Cyware

Better Together: How Cyware & Cyberint Pair Threat Intelligence & Automation

Cyware and Cyberint have established a partnership and integration that ties comprehensive intelligence collection with…
Learn more
SIM swapping Attacks

SIM Swapping Attacks Unmasked: Stay One Step Ahead

SIM swapping attacks involve threat actors gaining control over an individual's number, enabling identity theft….
Learn more
Mobile banking impersonating KIK and Viber

New Mobile Banking Malware Impersonating Messaging Apps

Cyberint has uncovered a new strain of mobile banking malware being distributed on 3rd-party APK…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start