Cyberint

Petah Tikva, Israel
2009
Nov 24, 2022   |  By Cyberint
Threats to the e-commerce industry have increased in the last year as multiple threat actors have complicated their attacking tactics, tools and procedures in order to gain higher efficiency and quick profit. The following report will cover the major threats in the upcoming holiday season and provide critical information and mitigation steps. Over the course of time, a trend that started in the United States has been adopted across the globe.It is the Friday after Thanksgiving, called Black Friday.
Nov 14, 2022   |  By Shmuel Gihon
Over the past weeks, Elon Musk’s purchase of Twitter has drawn the attention of people worldwide, even those who are not using the platform. One of many ideas Musk had while purchasing Twitter was to allow users to pay $8 per month and receive the blue check mark. Until this decision, only verified celebrities, companies, and journalists by Twitter, received the mark and it helped fight against fraud and identity theft incidents.
Oct 27, 2022   |  By Cyberint Research Team
The Guacamaya group is a fairly new hacktivist group based in Latin America. The group was first seen around March 2022 as they released sensitive data of several companies based in Chile, Ecuador, Brazil and Colombia. As mentioned, the group is mainly focusing on LATAM but dabbles every now and then with campaigns in Russia. The group is defined as a data leakage threat group, which means they do not encrypt but only leak the stolen data, often they do it for free.
Oct 6, 2022   |  By Cyberint Research Team
Q3 of 2022 has provided us with many interesting insights into the ransomware industry. While the number of incidents this quarter slightly increased compared to the previous quarter.
Oct 3, 2022   |  By The Cyberint Research Team
On September 29, Microsoft Security Threat Intelligence reported two significant zero-day vulnerabilities being exploited in the wild. The two vulnerabilities, named “ProxyNotShell”, affect Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019.
Oct 2, 2022   |  By Cyberint Team
It may sound counterintuitive, but the Dark Web presents an invaluable opportunity for businesses to flip the script on hackers. The Dark Web remains a relatively hidden digital space that comprises upwards of 5 percent of the entire internet. This is where cybercriminals go to peddle sensitive and valuable data after breaching vulnerable business networks.
Sep 29, 2022   |  By Shmuel Gihon
Over the past few months, a new info stealer has emerged. Erbium Stealer is developed by an underground Russian-based group that has been operating since July. The group seems to work very professionally, creating proper documentation and keeping their clients in the loop regarding new features on an almost weekly basis, via their Telegram channel.
Sep 22, 2022   |  By The Cyberint Research Team
In a world where more and more communities and businesses are based on instant messaging applications, it is just a matter of time before instant messaging takes the spotlight away from the traditional social media and commerce platforms. Instant messaging applications are more convenient than conventional forums and social media groups. However, the instant messaging realm is also divided into different application types and purposes.
Sep 21, 2022   |  By Shmuel Gihon
Lockbit3.0 is the number one ransomware group in the ransomware industry. The group’s operations are so vast and powerful, that we have witnessed weeks where Lockbit’s victim count was more than all other ransomware families altogether. Ever since Conti’s leaks, Lockbit overtook the ransomware throne without any intention of going down anytime soon.
Sep 13, 2022   |  By Shmuel Gihon
For some time now the Cyberint Research Team has been witnessing attacks targeting China. While most campaigns related to OpChina are focusing on infrastructure and government data breaches, over the past weekend, a major breach of the popular social network TikTok occurred, revealing 1.7 billion records and relations to another popular Chinese app – WeChat. The group taking full responsibility for this breach is none other than the notorious BlueHornet, aka AgainstTheWest, aka APT49.
Sep 29, 2022   |  By Cyberint
Join us for a session dedicated to Infostealers in the financial sector.
Aug 17, 2022   |  By Cyberint
Aug 16, 2022   |  By Cyberint
Infostealer Infections in the PH - The threat to the banking sector and what can be done?
May 3, 2022   |  By Cyberint
The Russia-Ukraine conflict has introduced us to a new era in which anyone can pick up a keyboard and join a cause they see fit. Groups like BlueHornet emerged as a result and caused havoc to anyone they saw as responsible. This reality raises many questions - will wars rise and fall in the decision of hacktivists instead of governments? Are we as a society legitimized this phenomenon, and where do we draw the line?
Apr 12, 2022   |  By Cyberint
In this webinar we take a look at the deep and dark web.
Mar 28, 2022   |  By Cyberint
Dr. Guy Almog was invited by the Knowledge Group to talk about how to prepare against attacks from the deep and dark web.
Mar 13, 2022   |  By Cyberint
See this session to understand how the dark web works, who are the individuals who go there and how they conduct business. You will also see how Cyberint conducts complex HUMIT (human intelligence) operations in order to get valuable and actionable information. Presented by Jacob Silutin - Sales Engineer, Cyberint, at Cyber Security Digital Summit - Threat Detection and Response on 22nd February 2022.
Mar 7, 2022   |  By Cyberint
What are the most common ways that threat actors breach organizations? How can Threat Intelligence help with Compliance? What does it take to get an effective and up-to-date threat intelligence? Watch this interview with Yochai Corem, CEO, Cyberint, from the Cybertech Israel tradeshow.
Feb 14, 2022   |  By Cyberint
Webinar on demand: "Threat Landscape for the Philippines Financial Industry" , hosted by Cyberint for the Bankers Association of the Philippines.
Feb 9, 2022   |  By Cyberint
In this webinar we learn about 2021's worst ransomware groups, their TTPs, and Cyberint Research's predictions for 2022.

Best-in-class managed intelligence suite. We help you identify emerging threats, verify your security posture, and respond effectively to reduce their impact.

CyberInt's Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations. Allowing our customers to combat and respond to advanced cyber threats that would normally go unnoticed by standard security controls, while protecting their brand, digital assets and customers.

Solutions:

  • Threat Intelligence: Real-time monitoring of threats in the deep, dark and open web such as phishing and malware campaigns, brute-force and credential stuffing threats, data leakage, including personal identifiable information (PII), and fraudulent activity.
  • Digital Risk: Digital footprint discovery and ongoing monitoring of organizations’ cloud and external facing assets. Ensuring visibility into assets with severity-based prioritization of issues to address, highlighting related threats, vulnerabilities, and weaknesses.
  • Threat Hunting: Driven by Cyberint proprietary intelligence and custom detections service provides continuous hunt for threats across the IT and infrastructure. Leveraging 3rd party EDR-agnostic technology and SOAR, we deploy proprietary automated playbooks to contain and mitigate threats within minutes.
  • Cybersecurity Assessment: Testing applications and infrastructure’s resilience to cyberattacks, to identify weaknesses and loopholes in your security posture.

Intelligence-driven Detection & Response. Leveraging threat intelligence suite, threat hunting and threat mitigation and response services.