Threat Intelligence Blog

Overcoming the Information Overload with Agility and Innovation

Overcoming the Information Overload with Agility and Innovation

Delilah Schwartz | 07 Mar 2022
With so much potential value to be realized, is there really such a thing as “too much data”? Delve deeper into the data paradox, and learn how embracing agility and technological innovation can help your business overcome the information overload.
Read More >
Is Your Security Response Team Working in OR or ER Mode?

Is Your Security Response Team Working in OR or ER Mode?

Delilah Schwartz | 03 Mar 2022
Security teams aim to anticipate and counteract cyber threats before they can manifest themselves in an attack against their organization. Most of all, SOC teams want to avoid a situation where multiple urgent threats need to be managed and remediated at the same time. A useful analogy to understand how organizations progress in their ability […]
Read More >
What is Your Level of Cybersecurity Readiness?

What is Your Level of Cybersecurity Readiness?

Delilah Schwartz | 01 Mar 2022
As organizations progress in their ability to respond to and mitigate cyber threats, developing and nurturing an effective security program, they typically advance through 5 levels of cybersecurity maturity. Where does your company fit on this scale, and what can be done to progress to the next level of cyber readiness?
Read More >
Illusions of Engagement: Defending Against Social Media Manipulation

Illusions of Engagement: Defending Against Social Media Manipulation

Delilah Schwartz | 24 Feb 2022
Despite the media spotlight on the dangers posed by politically-motivated social media manipulation to national security and democratic processes, the severity of the threat posed to private businesses through abuse of these platforms is often overlooked. Whether motivated by economic gain or personal vendettas, cybercriminal weaponization of social media against your business can cause devastating […]
Read More >
Where to Spend on Security Depends on Business Objectives

Where to Spend on Security Depends on Business Objectives

Lior Marom | 21 Feb 2022
As published in Security Magazine: CISOs very rarely have all the finances they want to fund their security operations. Striking the perfect budgetary balance can seem like an insurmountable task when the overall organizational risk posture depends on it. According to Cybersixgill’s CISO Lior Marom, for CISOs to get the best bang for their buck, […]
Read More >
The State of the Underground in 2021

The State of the Underground in 2021

Dov Lerner | 17 Feb 2022
Our analysis of 2021 resulted in two major findings. First, the underground ransomware economy grew tremendously, as the proliferation of services before attacks contributed to the rise in overall attacks. Second, the underground ecosystem has become increasingly decentralized, as the largest forums shrunk but overall underground participation rose.
Read More >
Underground Financial Fraud Drops 51% in the Second Half of 2021

Underground Financial Fraud Drops 51% in the Second Half of 2021

Cher Lingord | 14 Feb 2022
In the cybercriminal underground, your hard-earned money may be up for grabs. On the dark web, financial account data – traded as dumps or CVVs – is available by the millions, in a thriving ecosystem of cyber fraudsters looking to profit at their victims’ expense. In the final 6 months of 2021, Cybersixgill observed a […]
Read More >
Brand Monitoring: Protect Your Hard-Earned Reputation from Impersonation

Brand Monitoring: Protect Your Hard-Earned Reputation from Impersonation

Laurie Ben-Haim | 10 Feb 2022
Building a successful and reputable brand is no easy feat, but keeping your hard work safe from cybercriminal copycats, hijackers, fraudsters and thieves can be. With automated brand monitoring within the deep and dark web, Cybersixgill provides a solution to help your team stay ahead of the bad guys and protect your brand from cyber […]
Read More >
Telegram: A Cybercriminal Hotspot – Phishing Tools and Services

Telegram: A Cybercriminal Hotspot – Phishing Tools and Services

Adi Bleih | 07 Feb 2022
On Telegram, cybercriminals can find all the bait they need to set up and deploy sophisticated phishing campaigns against a wide net of unwitting targets. In this final installment of our series exploring Telegram’s cybercriminal underworld, we explore the platform’s illicit market for phishing tools and services.
Read More >
Cyber Threat Intelligence: The Key to Successful Incident Response

Cyber Threat Intelligence: The Key to Successful Incident Response

Laurie Ben-Haim | 03 Feb 2022
Established incident response processes are arguably the most important component of a cybersecurity program, providing clear guidelines to effectively handle security incidents and reduce the recovery time, damage and costs left in their aftermath. With automated threat intelligence and proactive strategic planning, you can accelerate the incident response life cycle and better protect your organization […]
Read More >