Threat Intelligence Blog

Telegram: A Cybercriminal Hotspot – Malware

Telegram: A Cybercriminal Hotspot – Malware

Adi Bleih | 31 Jan 2022
Telegram has a complicated relationship with malware. Not only do cybercriminals leverage the messaging app to buy and sell a wide variety of malicious hacking tools and programs, they also abuse the platform as a springboard to launch, execute and disseminate their attacks.
Read More >
Vulnerability Exploitation: The Most Common Attack Vector for Cybercriminals

Vulnerability Exploitation: The Most Common Attack Vector for Cybercriminals

Laurie Ben-Haim | 27 Jan 2022
Vulnerability exploitation has become the most common attack vector for cybercriminals, constituting one of the top 5 cybersecurity risks. Effective vulnerability management requires a proactive approach, harnessing threat intel directly from the underground to help you address the most critical vulnerabilities before threat actors can strike. 
Read More >
Telegram: A Cybercriminal Hotspot – Illicit Items for Sale

Telegram: A Cybercriminal Hotspot – Illicit Items for Sale

Adi Bleih | 24 Jan 2022
Cybercrime is thriving on Telegram, with more & more threat actors choosing the encrypted messaging app as a viable alternative to the secretive forums of the deep and dark web. In the second installment of this four-part series exploring Telegram’s cybercriminal underbelly, we delve into the other illicit items sold on the platform, including counterfeit […]
Read More >
Easy Access to Leaked Credentials: One of the Top 5 Cybersecurity Risks

Easy Access to Leaked Credentials: One of the Top 5 Cybersecurity Risks

Laurie Ben-Haim | 20 Jan 2022
Leaked credentials are the dark web’s bestseller, stolen through data breaches, credential stuffing and phishing campaigns. Learn how Cybersixgill can stop the leak at the first drop.
Read More >
Telegram: A Cybercriminal Hotspot – Compromised Financial Accounts

Telegram: A Cybercriminal Hotspot – Compromised Financial Accounts

Adi Bleih | 17 Jan 2022
Cybercrime is thriving on Telegram, with more & more threat actors choosing the encrypted messaging app as a viable alternative to the secretive forums of the deep and dark web. In this four-part series, we will explore Telegram’s cybercriminal underbelly, starting with the illicit markets for compromised financial accounts.
Read More >
Remote Desktop Protocol (RDP) – The #1 Way to Get Attacked

Remote Desktop Protocol (RDP) – The #1 Way to Get Attacked

Laurie Ben-Haim | 13 Jan 2022
The #1 risk to the security of the network is for an attacker to gain access through a compromised RDP connection. Learn how to prevent and protect against this threat with threat intelligence.
Read More >
Case Study: How an International MSSP Slashed the Time Required for Threat Investigations

Case Study: How an International MSSP Slashed the Time Required for Threat Investigations

Meira Primes | 10 Jan 2022
At global MSSP CyberProof, gathering intel from the dark web used to be a slow process for threat analysts. Here’s how they’ve made it faster and more thorough.
Read More >
Virtual Cards, Cybersecurity & Data Protection: What Financial Institutions Should Know

Virtual Cards, Cybersecurity & Data Protection: What Financial Institutions Should Know

Christopher Strand | 03 Jan 2022
Virtual cards offer vast opportunities for financial institutions, presenting a safer and more secure alternative to the standard physical credit card. However, virtual cards are not a silver bullet – they too present cybersecurity challenges that, if not properly addressed, can put customers’ information (and money) at risk.
Read More >
Rigging the Whack-a-Vulnerability Game in Your Favor

Rigging the Whack-a-Vulnerability Game in Your Favor

Omer Carmi | 03 Jan 2022
Vulnerability management is often compared to a game of Whack-a-Mole, with new vulnerabilities constantly popping up and no end in sight. What if there was a way to rig this Whack-a-Vulnerability game in your favor?
Read More >
Log4j Repos: An Unprecedented Event on Github

Log4j Repos: An Unprecedented Event on Github

Dov Lerner | 27 Dec 2021
The Log4j vulnerability is the topic on everyone’s lips, and Github is no exception. At 223 repos and counting, threat actors don’t need to look far to find the exploits they need.
Read More >