Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Dov Lerner | 05 Sep 2021
Threat actors constantly look for vulnerabilities in systems and networks. This includes efforts to crack RDP connections, since with remote access to an internal network, an actor can cause quite a bit of damage. With RDP credentials, an actor can exfiltrate sensitive data, deploy ransomware, or use the resources as a staging ground for a […]
Read More >
Dark Web Scraping

Dark Web Scraping

Dov Lerner | 02 Sep 2021
What is scraping, why is it so common among threat actors, and how can it jeopardize individuals’ privacy? Check out this post for the details you need.
Read More >
ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

Michael Angelo Zummo | 09 Aug 2021
A Remote Access Trojan (RAT) dubbed ‘ToxicEye’ continues to maintain wide popularity in the underground three years after its initial release. This malware, used to infect devices via the Telegram messaging app, provides threat actors complete control over a victim’s device.
Read More >
Beyond the Buzzwords: Actionable Insights

Beyond the Buzzwords: Actionable Insights

Gilad Levy | 05 Aug 2021
In the previous posts we’ve explored the TI buzzwords “real-time” and “AI”.  We’ve ventured beyond the hype and learned how to understand whether or not a certain solution is suitable for you. Our buzzword this week is “actionable insights” – a term that has been beaten by tech marketers harder than a birthday piñata. We’ll take a deeper look […]
Read More >
Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Meira Primes | 04 Aug 2021
If there is one constant in the world of cybersecurity and cyber threat intelligence (CTI), it’s how quickly it moves. But while the threats cybersecurity professionals confront and the technologies at their disposal progress rapidly, the size of their workforce does not keep up with demand. The frequency, scope, and cost of cyberattacks keep rising, […]
Read More >
Ransomware Retail: Underground Remote Access Markets

Ransomware Retail: Underground Remote Access Markets

Dov Lerner | 22 Jul 2021
A major component in the rise of the severity and scope of ransomware attacks is the availability of remote access for purchase on the deep and dark web.
Read More >
The Cybersecurity Workforce, Knowledge and Skill Gaps

The Cybersecurity Workforce, Knowledge and Skill Gaps

Lisa Courturier | 22 Jul 2021
Read the recap from PrivSec Global Conference on the topic of The Cybersecurity Workforce, Knowledge and Skill Gaps.
Read More >
Looking Beyond CVSS Scores for Effective Vulnerability Management

Looking Beyond CVSS Scores for Effective Vulnerability Management

Sumukh Tendulkar | 22 Jul 2021
Vulnerability management is a critical part of cybersecurity, yet the conventional approach often relies on outdated and incomplete info. Here’s a more promising alternative.
Read More >
How Cybersixgill’s Dynamic Vulnerability Exploit Score (DVE) Simplifies Vulnerability Management for Swimlane Customers

How Cybersixgill’s Dynamic Vulnerability Exploit Score (DVE) Simplifies Vulnerability Management for Swimlane Customers

Laurie Ben-Haim | 13 Jul 2021
Swimlane customers can now use the Cybersixgill Dynamic Vulnerability Exploit Score (DVE) to take on the challenge of vulnerability management.
Read More >
Cybersecurity Meets Business: 4 Key Trends from Our PrivSec Global Discussion

Cybersecurity Meets Business: 4 Key Trends from Our PrivSec Global Discussion

Sumukh Tendulkar | 08 Jul 2021
Risk ∝ (Threat * Vulnerability) / Controls More threats or more unmitigated vulnerabilities means more risk. More effective controls means less risk. We all know this and most of us have experienced it. It really is straightforward. However, full 68% of executives say their cyber risk is increasing. Covid-19 and digital transformation meant even more increase in […]
Read More >