Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2024

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

A wave of X account hacks has led to the rapid success of a pump-and-dump scheme for the $HACKED Solana token, with users rushing to buy in. High-profile accounts compromised in this attack include MoneyControl (1.4 million followers), People Magazine (7.8 million), and EUinmyRegion, run by the European Commission, with nearly 100,000 followers. Moreover, Computer brand Lenovo’s India division, film director Oliver Stone, Yahoo News UK, and Brazilian soccer player Neymar Jr.

The 4 Most Common Attack Vectors in LATAM

The digital footprint of organizations has evolved and grown significantly over the past 10 years, now its important to not only protect just IP addresses and domains but also social media, payment platforms, and third-party services. Identifying risks like vulnerabilities, supply chain attacks, and credential leaks are crucial for organizational security. The Cyberint team have analyzed 1000s of risks and threats and narrowed down the top 4 risks facing Latin America in 2024 and going into 2025.

Why MSSPs Are Short on Good External Risk Management Tools

If you’ve worked in the Managed Security Services Provider (MSSP) industry for a while, you might remember the era when the MSSP tool set consisted only of internal risk management solutions – like software that scanned client endpoints and application source code. Those days are gone. Today, external risk management has become just as critical a part of an MSSP’s job.

Solving MSSP Customer Abandonment Challenges by Choosing the Right MSSP Software

If you’re in the Managed Security Services Provider (MSSP) business, landing new customers is great. What’s even better, however – and more crucial for long-term business success – is retaining existing customers. After all, keeping customers can cost up to 25 times less than acquiring new ones, according to Harvard Business Review.

Cybersecurity Platform Consolidation: The Key to Enhanced Protection at a Lower Cost

To platform or not to platform. That is the question. At least, that’s the question that businesses increasingly face as they chart strategies for managing external risk and consider cybersecurity platform consolidation. Historically, the go-to approach for identifying and mitigating external risks was to adopt point solutions – meaning individual tools that focused on doing one thing and doing it well.

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Initial Access Brokers (IABs) are threat actors who infiltrate networks, systems, or organizations and sell this unauthorized access to other malicious actors. Instead of executing the entire cyberattack, IABs focus on the initial breach and monetize it by selling access to compromised systems. They assist ransomware operations, particularly RaaS schemes, by streamlining attacks and reducing workload at the start.