Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often need to access various online services for work and personal purposes. Whether signing up for industry newsletters, registering for webinars, or using online tools, a corporate email address is a convenient way to manage professional communication. However, this seemingly harmless habit can expose employees and their organizations to significant risks.

The Hidden War on Instagram: Brands vs. Impersonators

Instagram became massively popular by making it simple for anyone to share photos and videos. But from the perspective of cybersecurity and brand protection, there’s a downside to the ease with which anyone can create an Instagram account and begin sharing content: The risk of Instagram impersonation. Instagram impersonation occurs when a malicious user creates an Instagram account that pretends to be owned by or associated with another entity.

Cyberint's Integration with Check Point: Challenges and Endless Possibilities

As a Group Leader in the R&D team at Cyberint before the acquisition, we worked tirelessly to push the boundaries. Whether it was outpacing the competition with cutting-edge technology, delivering exceptional UI/UX, or ensuring our customers were satisfied with the precision and impact of our findings, we did it with a team that was small but mighty.

The ROI of Active Exposure Validation

Organizations are overwhelmed by the sheer volume of vulnerabilities detected across their digital assets. Teams risk wasting time on low-impact issues while missing critical vulnerabilities that attackers could exploit. This inefficiency increases exposure to breaches and prolongs Mean Time to Resolution (MTTR). The diagram below shows the number of new vulnerabilities detected per quarter, from the year 2000 to Q1 2024, and the trend is not hard to see.

The Rise of Pig Butchering Scams

In recent years, “Pig Butchering” scams have rapidly emerged as a significant global threat, primarily targeting individuals with fraudulent investment schemes. This type of scam, originally known for its roots in China, has transformed into a global phenomenon, where victims are led to believe they are making lucrative investments, often in cryptocurrency.

Retail Threat Landscape 2024

The United States, is a prime target for cyber attacks. The U.S. retail sector, which holds nearly one-third of the global market share, has seen a significant rise in ransomware incidents, accounting for 45% of global retail ransomware cases in the past three quarters—a 9% increase from 2023. New groups like Ransomhub and Hunters have emerged and supply chain threats have increased. Social engineering tactics are on the rise, with attackers impersonating IT personnel.

Akira Ransomware: Published Over 30 New Victims on their DLS

The Akira ransomware group has been active since March 2023, targeting diverse industries across North America, the UK, and Australia. Operating as a Ransomware-as-a-Service (RaaS) model, Akira employs a double-extortion strategy by stealing sensitive data before encrypting it. According to their leak site, the group claims to have compromised over 350 organizations.

Not Your Grandfather's Hacktivists: How Hacktivism Has Evolved

Hacktivism – the practice of carrying out cyberattacks to advance political or social goals – is not new. Hacktivist attacks go as far back as the 1980s. Yet today’s hacktivists often look and operate in ways that are markedly different from their predecessors. They’ve embraced new techniques, they often have more resources at their disposal and they can prove more challenging to stop.

How Will the NIST CSF Framework 2.0 Impact Everyone?

The National Institute of Standards and Technology (NIST) has released version 2.0 of its Cyber security Framework (CSF), significantly elevating cyber security guidelines. This update brings in major changes that will affect several actors like Chief Information Security Officers (CISOs), Managed Security Service Providers (MSSPs), and individual users, among others.