Threat Intelligence Blog

Cybersixgill Offices ’Feel the Heat’ with Summer Hackathon

Cybersixgill Offices ’Feel the Heat’ with Summer Hackathon

Laurie Ben-Haim | 11 May 2021
We are excited to announce the first CyberSixgill Hackathon. For the past two days, Cybersixgill’s headquarters in Tel Aviv’s Azrieli towers was abuzz with teams of developers letting their imaginations run wild to develop and present new features and capabilities to inspire the future of darknet threat intelligence. Developers and other employees alike donned hackathon T’s […]
Read More >
Cybersixgill Darkfeed Now Available to ServiceNow Customers on the Store

Cybersixgill Darkfeed Now Available to ServiceNow Customers on the Store

Laurie Ben-Haim | 09 May 2021
Increased efficiency. Heightened accuracy and reliability. Greater speed, agility, and scalability. In today’s business environment, it’s not hard to see the main benefits of digital transformation. But to realize all those benefits while managing the risk posed by cyber threats, companies and organizations need cutting-edge cybersecurity solutions. And cyber threat intelligence is a key area […]
Read More >
Detecting Data Leakage: Why It Matters, and How the Dark Web Can Help

Detecting Data Leakage: Why It Matters, and How the Dark Web Can Help

Laurie Ben-Haim | 29 Apr 2021
For today’s companies, data leaks can be costly – especially if they go undetected for a long time. Effective threat intelligence greatly mitigates that risk.
Read More >
CISO Roundtable #3: Real-World Lessons from a Virtual Discussion

CISO Roundtable #3: Real-World Lessons from a Virtual Discussion

Meira Primes | 22 Apr 2021
Perhaps the most important lesson in the field of cybersecurity is that there’s always more to learn – not just about the threats companies and organizations face and ways to manage them, but also about how to work effectively within an organization that is not primarily focused on cybersecurity. And when it comes to finding […]
Read More >
What You Need to Know About Preventing Zero-Day Attacks

What You Need to Know About Preventing Zero-Day Attacks

Meira Primes | 19 Apr 2021
There is a very simple reason that it’s so difficult to prevent zero-day attacks: By definition, zero-day attacks exploit zero-day vulnerabilities – flaws in software and hardware for which no patch has yet been released. In other words, a zero-day attack is a type of cyberattack that takes advantage of problems that have yet to […]
Read More >
What Is a Zero-Day Attack, and Should It Concern You?

What Is a Zero-Day Attack, and Should It Concern You?

Meira Primes | 13 Apr 2021
an essential aspect of cybersecurity. But by their very nature, these attacks are particularly difficult to prevent. That makes it important to understand what zero-day attacks are, why they are so common, and what specific steps you can take to minimize the risk you face. With that in mind, this post will introduce you to […]
Read More >
DarkWebster: Your Dictionary of Dark Web Jargon

DarkWebster: Your Dictionary of Dark Web Jargon

Dov Lerner | 08 Apr 2021
In the fast-moving world of cyberthreat intelligence, knowing the right vocabulary is critical – especially when it comes to the deep and dark web. When hackers and other threat actors want to anonymously communicate with one another about their criminal plots, the underground forums and groups of the deep and dark web are their go-to […]
Read More >
An Inside Look into the Growing Market for SMS Hacking on the Dark Web

An Inside Look into the Growing Market for SMS Hacking on the Dark Web

Dov Lerner | 06 Apr 2021
Financial services enterprise identified a supply chain compromise in RDP credentials using critical, timely threat intelligence. They blocked the cyberattack attack avoiding damaging breach. Read more.
Read More >
CISO Rountable key takeaways

CISO Rountable key takeaways

Meira Primes | 01 Apr 2021
Cybersixgill Kicks off CISO Roundtables In February, Cybersixgill held its first CISO roundtable, where cybersecurity and risk executive leaders from the US and Europe gathered to discuss top cybersecurity concerns for 2021. They also discussed the definition of threat intelligence within their organizations and the role threat intel plays within their risk management strategy.   […]
Read More >
A new way to save the day: harnessing threat actor’s intent to revolutionize vulnerability management

A new way to save the day: harnessing threat actor’s intent to revolutionize vulnerability management

omer Carmi | 23 Mar 2021
Dynamic Vulnerability Exploit Score leverages artificial intelligence and dark web chatter to accelerate vulnerability management
Read More >