Remote Desktop Protocol (RDP) – The #1 Way to Get Attacked

Remote Desktop Protocol (RDP) – The #1 Way to Get Attacked

Laurie Ben-Haim | 13 Jan 2022
The #1 risk to the security of the network is for an attacker to gain access through a compromised RDP connection. Learn how to prevent and protect against this threat with threat intelligence.
Read More >
Case Study: How an International MSSP Slashed the Time Required for Threat Investigations

Case Study: How an International MSSP Slashed the Time Required for Threat Investigations

Meira Primes | 10 Jan 2022
At global MSSP CyberProof, gathering intel from the dark web used to be a slow process for threat analysts. Here’s how they’ve made it faster and more thorough.
Read More >
Virtual Cards, Cybersecurity & Data Protection: What Financial Institutions Should Know

Virtual Cards, Cybersecurity & Data Protection: What Financial Institutions Should Know

Christopher Strand | 03 Jan 2022
Virtual cards offer vast opportunities for financial institutions, presenting a safer and more secure alternative to the standard physical credit card. However, virtual cards are not a silver bullet – they too present cybersecurity challenges that, if not properly addressed, can put customers’ information (and money) at risk.
Read More >
Rigging the Whack-a-Vulnerability Game in Your Favor

Rigging the Whack-a-Vulnerability Game in Your Favor

Omer Carmi | 03 Jan 2022
Vulnerability management is often compared to a game of Whack-a-Mole, with new vulnerabilities constantly popping up and no end in sight. What if there was a way to rig this Whack-a-Vulnerability game in your favor?
Read More >
Log4j Repos: An Unprecedented Event on Github

Log4j Repos: An Unprecedented Event on Github

Dov Lerner | 27 Dec 2021
The Log4j vulnerability is the topic on everyone’s lips, and Github is no exception. At 223 repos and counting, threat actors don’t need to look far to find the exploits they need.
Read More >
Shopping Seasons and Scamming Sites

Shopping Seasons and Scamming Sites

Adi Bleih | 23 Dec 2021
Cybercriminals prepare long in advance for the holiday season – but they won’t need any wrapping paper for what they have in store. ‘Tis the season for phishing, and you’d better watch out.
Read More >
Forrester TEI: Cybersixgill can deliver 311% ROI, enabling enterprises to scale dark web threat intelligence while closing the knowledge gaps

Forrester TEI: Cybersixgill can deliver 311% ROI, enabling enterprises to scale dark web threat intelligence while closing the knowledge gaps

Meira Primes | 22 Dec 2021
A recent Total Economic Impact (TEI) conducted by independent consulting firm Forrester has affirmed: organizations employing Cybersixgill products experienced benefits of almost $1.57, and a 311% return on investment. 
Read More >
Case Study: How Our Investigative Portal Enhanced Radware’s Threat Intel

Case Study: How Our Investigative Portal Enhanced Radware’s Threat Intel

Laurie Ben-Haim | 20 Dec 2021
When Radware wanted to streamline its approach to gathering threat intel from the deep & dark web, the company turned to Cybersixgill. Check out the results.
Read More >
Cortex XSOAR Customers Can Now Get Actionable Alerts from the Cybersixgill Investigative Portal

Cortex XSOAR Customers Can Now Get Actionable Alerts from the Cybersixgill Investigative Portal

Dor Gosher | 16 Dec 2021
Cortex XSOAR customers can now bolster their cyber threat intel with our customizable, actionable alerts from the deep & dark web. Here’s what you need to know.
Read More >
The Apache Avalanche: Log4j2 Zero-Day Vulnerability

The Apache Avalanche: Log4j2 Zero-Day Vulnerability

Lior Marom | 12 Dec 2021
The Log4j2 Zero-Day vulnerability lit up the internet like an overachieving neighbor decorating their house for Christmas. Only days within its discovery, CVE-2021-44228 catapulted to the top of the CVE board, scoring the dreaded 10/10 CVSS rating. 
Read More >