Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Cryptocurrency on the Underground

Over the past decade, cryptocurrency has significantly disrupted the economic and business landscape. Its popularity has soared, driven by the promise of anonymous transactions and the potential for substantial returns on investment. However, the crypto market’s vulnerabilities, coupled with limited government oversight, have provided fertile ground for cybercrime to flourish.

Legal Takedowns vs. Cyber Takedowns: What to Use When

Imagine you’ve just discovered that threat actors have registered a lookalike domain and are using it to host content that impersonates your business. It’s a safe bet that your customers will soon begin falling for the ruse and handing over personal information to the threat actors, if they’re not already. Faced with this threat, how can you protect your business’s reputation and brand? There are two main options.

A Guide to the 2 Main Types of Retail & E-Commerce Fraud

The first step in combating retail fraud is learning which forms it takes. That’s easy enough, because there are two main types of retail and eCommerce fraud today: The second step in stopping retail fraud from harming your business is to understand how each type of fraud works, then implement a strategy to protect against it.

Finance's Cyber Armor: External Risk Mitigation and Management

Businesses of all types face a variety of direct and indirect cybersecurity risks that originate from external sources. Protecting against them is where External Risk Mitigation and Management, or ERMM, comes into play. Here’s a look at the role that the ERMM process plays in providing the intelligence, scoping and discovery capabilities that modern organizations need.

Into the Depths of Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March 2023, when it began to target companies in attacks. The Abyss Locker ransomware group has evolved into a menace for a wide array of entities, including industrial control systems (ICS), enterprises, and public-sector organizations. This shift is attributed to the introduction of a specialized Linux encryptor designed to target VMware’s ESXi virtualized environments.

Meet AZORult Stealer: High Risk, Open Source & Evolving

AZORult stealer was first discovered in 2016 and is regarded as a high-risk Trojan-type virus created to collect private data. Over time,the AZORult stealer evolved into a free, open-source program. We discovered advertising with instructions for installing the stealer in “TheJavaSea” and “Nulled” within the prominent Darknet forums. AZORult, one of the most dominant stealers, has taken the place of honor among the top 5 stealers worldwide in the last couple of years.

Cyberint's 2024 Threat Landscape Predictions

2023 was full of cases, campaigns, arrests and developments worldwide in the cybersecurity world. Through continued research and monitoring of various threats and risks worldwide, the Cyberint Research Team forecasts how they will affect our lives in 2024. Cyberint considered many factors in our predictions for 2024 as we wanted to emphasize how these risks will react to technological, political and strategic trends.

The Top Financial Organization Cyber Risks of 2024

For years, the BFSI industry has been a top target for cyberattackers. Yet, despite long-standing awareness of financial cyber risks, the problem is only getting worse as banks, insurance companies, FinTech businesses and other organizations that operate in the finance sector face a growing array of threats and risks. For example, threat actors are increasingly using financial organizations’ customers as a vector for attack.

Meta is down: Skynet and Other Groups Claim to Have Attacked

Update: Meta appears to be coming online again. Breaking news: 3 threat actor groups (Skynet, Godzilla, and Anonymous Sudan) have claimed to attack and shut down Facebook, Threads and Instagram. Users are being automatically logged out of Meta and being shown session expired messages. Then they are unable to log back in. Instagram is showing feed errors.