Threat Intelligence Blog

Key Business And Cybersecurity Lessons From Our APAC Region CISO Roundtable

Key Business And Cybersecurity Lessons From Our APAC Region CISO Roundtable

Meira Primes | 20 Sep 2021
In today’s world, it can be easy to lose the forest of cybersecurity for the trees – to lose sight of the business impact of potential cyber threats amid so much jargon about threat actors and their tactics, techniques, and procedures (TTPs).   Yet, for today’s companies, what cybersecurity boils down to is simple: dollars […]
Read More >
Underground Financial Fraud H1-2021

Underground Financial Fraud H1-2021

Edan Cohen | 13 Sep 2021
In the cybercriminal underground, data is money. For fraudsters, financial account data - traded as dumps or CVVs - is akin to striking oil. Just how profitable has 2021 been for the world's 3rd largest economy in the first 6 months of 2021?
Read More >
Behind the Meteoric Rise of OpenBullet

Behind the Meteoric Rise of OpenBullet

Michael Angelo Zummo | 05 Sep 2021
A powerful, open-source penetration testing tool has become the password cracker of choice on the dark web, and its users are increasingly focused on getting access ...
Read More >
Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Dov Lerner | 05 Sep 2021
Threat actors constantly look for vulnerabilities in systems and networks. This includes efforts to crack RDP connections, since with remote access to an internal network, an actor can cause quite a bit of damage. With RDP credentials, an actor can exfiltrate sensitive data, deploy ransomware, or use the resources as a staging ground for a […]
Read More >
Dark Web Scraping

Dark Web Scraping

Dov Lerner | 02 Sep 2021
What is scraping, why is it so common among threat actors, and how can it jeopardize individuals’ privacy? Check out this post for the details you need.
Read More >
ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

Michael Angelo Zummo | 09 Aug 2021
A Remote Access Trojan (RAT) dubbed ‘ToxicEye’ continues to maintain wide popularity in the underground three years after its initial release. This malware, used to infect devices via the Telegram messaging app, provides threat actors complete control over a victim’s device.
Read More >
Beyond the Buzzwords: Actionable Insights

Beyond the Buzzwords: Actionable Insights

Gilad Levy | 05 Aug 2021
In the previous posts we’ve explored the TI buzzwords “real-time” and “AI”.  We’ve ventured beyond the hype and learned how to understand whether or not a certain solution is suitable for you. Our buzzword this week is “actionable insights” – a term that has been beaten by tech marketers harder than a birthday piñata. We’ll take a deeper look […]
Read More >
Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Meira Primes | 04 Aug 2021
If there is one constant in the world of cybersecurity and cyber threat intelligence (CTI), it’s how quickly it moves. But while the threats cybersecurity professionals confront and the technologies at their disposal progress rapidly, the size of their workforce does not keep up with demand. The frequency, scope, and cost of cyberattacks keep rising, […]
Read More >
Ransomware Retail: Underground Remote Access Markets

Ransomware Retail: Underground Remote Access Markets

Dov Lerner | 22 Jul 2021
A major component in the rise of the severity and scope of ransomware attacks is the availability of remote access for purchase on the deep and dark web.
Read More >
The Cybersecurity Workforce, Knowledge and Skill Gaps

The Cybersecurity Workforce, Knowledge and Skill Gaps

Lisa Courturier | 22 Jul 2021
Read the recap from PrivSec Global Conference on the topic of The Cybersecurity Workforce, Knowledge and Skill Gaps.
Read More >