15 Jun 2022

The Chinese-Russian Cybercrime Threat Intelligence Report

Are Chinese and Russian hackers joining forces to attack computer systems and networks in other countries? A newly formed Russian-Chinese ransomware-forum alliance – and the organizer’s call to action against the U.S. – has some cyber specialists alarmed about the threats such a collaboration might pose to the rest of the world. To discern the […]

Read More >
The Chinese-Russian Cybercrime Threat Intelligence Report
The Chinese-Russian Cybercrime Threat Intelligence Report

The Chinese-Russian Cybercrime Threat Intelligence Report

Naomi Yusupov | 15 Jun 2022
Are Chinese and Russian hackers joining forces to attack computer systems and networks in other countries? A newly formed Russian-Chinese ransomware-forum alliance – and the organizer’s call to action against the U.S. – has some cyber specialists alarmed about the threats such a collaboration might pose to the rest of the world. To discern the […]
Read More >
File Sharing Services on the Cybercriminal Underground

File Sharing Services on the Cybercriminal Underground

Adi Bleih | 09 Jun 2022
The digital workforce is transferring far more and far larger files among a more comprehensive network of computers at faster speeds than ever before. Managing, controlling, and securing the ad hoc data flow across systems, ecosystem partners, and customers grows more and more complex as enterprise organizations attempt to balance the dueling needs of ensuring […]
Read More >
How to Organize the Flood of Threat Intelligence Data to Make it More Actionable

How to Organize the Flood of Threat Intelligence Data to Make it More Actionable

Dani Woolf | 08 Jun 2022
On a recent episode of our podcast, Dr. Dark Web hosted by Chris Roberts, we had the opportunity to pick the brain of Cecil Pineda, the SVP/CISO at R1 RCM. Pineda is the co-founder of CISO XC, and works for dozens of CIOs, CISOs and CPOs of Fortune 100 companies, helping them maneuver through acquisitions […]
Read More >
CTI: A Useful Ally for the Financial Services Industry

CTI: A Useful Ally for the Financial Services Industry

Christopher Strand | 24 May 2022
Since 2013, more than 14 billion global data records have been lost. In 2021 alone, more than 40.4 billion global records were exposed by cyber adversaries. As the scope and value of individuals’ personal financial data available online grows every day, it becomes a more enticing target.  Simultaneously, a flood of new data protection laws […]
Read More >
Why Cybersixgill Became a Participating Organization with the PCI SSC

Why Cybersixgill Became a Participating Organization with the PCI SSC

Christopher Strand | 12 May 2022
As more companies increase their cloud presence, allow their workforce to work remotely, and expand their threat surface, security professionals and cybersecurity frameworks must constantly up their game to wage successful countermeasures to ensure they do not fall victim to the ever-increasing threat. Many sectors and industries are under the scrutiny of the Payment Card […]
Read More >
Russia and Ukraine Conflict Q&A

Russia and Ukraine Conflict Q&A

Gabi Reish | 05 May 2022
More than two months have passed since Russian ground forces first invaded Ukraine on February 24. While Russian and Ukrainian troops face off in bloody combat on the physical battlefield, another war rages in parallel in an entirely separate arena – cyberspace. Hacktivist groups backing each side of the conflict have joined the war effort, […]
Read More >
Cybersixgill Partners with Snowflake to Provide Comprehensive Cyber Threat Intel in the Snowflake Data Marketplace

Cybersixgill Partners with Snowflake to Provide Comprehensive Cyber Threat Intel in the Snowflake Data Marketplace

Dor Gosher | 05 Apr 2022
Leverage our real-time collection of  data from the largest sources in the cyber underground. Proactively detect and protect against those threat actors targeting your organization, like ransomware, malware, data leaks, and much more. You have access to the insights needed to strategically augment your cyber resilience and significantly minimize risk exposure in real-time.
Read More >
Painless Steal: The Malware of Choice for Initial Access Brokers

Painless Steal: The Malware of Choice for Initial Access Brokers

Dov Lerner | 28 Mar 2022
The fundamental law of market economics dictates that as demand increases for a particular good or service, the quantity of supply rises in turn. The underground economy is no exception. The rapid rise of cybercrime has created ample opportunities for Initial Access Brokers, who have exploited the skyrocketing demand for outsourced access to create a […]
Read More >
The Okta Hack: How Supply Chain Attacks Have Moved Underground

The Okta Hack: How Supply Chain Attacks Have Moved Underground

Gabi Reish | 25 Mar 2022
The business world has been abuzz about the Okta breach that occurred earlier this week. Okta was transparent about how it happened – and people have been questioning who is behind LAPSUS$, the group that carried out the attack. But there is a lot more to the story than meets the eye. At Cybersixgill, we […]
Read More >
Protecting Profitability for the Cyber Insurance Business with Cyber Threat Intelligence

Protecting Profitability for the Cyber Insurance Business with Cyber Threat Intelligence

Delilah Schwartz | 24 Mar 2022
Cyber insurance is ostensibly intended to cover losses incurred as a result of cyberattacks against policyholders, networks or systems. However, to remain profitable amid unabating breaches and the mounting costs of payable claims, insurers must take a more proactive approach to minimizing their clients’ risk exposure – leveraging cyber threat intelligence to identify and mitigate […]
Read More >