Threat Intelligence Blog

Inside the Criminal Mind of the Future

Inside the Criminal Mind of the Future

Gilad Levy | 04 Oct 2021
Cybersecurity and information technology leaders discuss various aspects of the future of cybercrime and how to prevent or defend against it. Here’s what you need to know.
Read More >
How to Implement an Effective Threat Intelligence Program

How to Implement an Effective Threat Intelligence Program

Gilad Levy | 30 Sep 2021
Discover 5 key recommendations on how to implement an effective threat intelligence program - brought to you by some of the top dogs of cybersecurity.
Read More >
Maltego Users Can Now Access Cybersixgill’s Threat Intel from the Dark Web

Maltego Users Can Now Access Cybersixgill’s Threat Intel from the Dark Web

Ron Shamir | 22 Sep 2021
Maltego users can easily bolster their cyber threat investigations using Cybersixgill’s unmatched collection of intelligence from the deep and dark web.
Read More >
4 Steps to Create an Effective Threat-Hunting Roadmap

4 Steps to Create an Effective Threat-Hunting Roadmap

Tirtza Bensoussan | 20 Sep 2021
For those companies and organizations that have the most at stake when it comes to cybersecurity, threat hunting is a powerful tool for proactively looking for evidence of a cyberattack. But, as we explained in what security teams need to know about threat hunting, threat hunting is a complex and resource-intensive process. How can you […]
Read More >
3 Steps To Take Before Executing A Cyber Threat Hunt

3 Steps To Take Before Executing A Cyber Threat Hunt

Tirtza Bensoussan | 20 Sep 2021
For organizations that have serious concerns that they could fall victim to a serious and costly cyberattack, threat hunting offers a proactive and effective way to minimize the chances of unknowingly suffering from an attack for an extended period. But reliable and efficient threat hunting requires expertise, structure, and the right tools for streamlining the […]
Read More >
Key Business And Cybersecurity Lessons From Our APAC Region CISO Roundtable

Key Business And Cybersecurity Lessons From Our APAC Region CISO Roundtable

Meira Primes | 20 Sep 2021
In today’s world, it can be easy to lose the forest of cybersecurity for the trees – to lose sight of the business impact of potential cyber threats amid so much jargon about threat actors and their tactics, techniques, and procedures (TTPs).   Yet, for today’s companies, what cybersecurity boils down to is simple: dollars […]
Read More >
Underground Financial Fraud H1-2021

Underground Financial Fraud H1-2021

Edan Cohen | 13 Sep 2021
In the cybercriminal underground, data is money. For fraudsters, financial account data - traded as dumps or CVVs - is akin to striking oil. Just how profitable has 2021 been for the world's 3rd largest economy in the first 6 months of 2021?
Read More >
Behind the Meteoric Rise of OpenBullet

Behind the Meteoric Rise of OpenBullet

Michael Angelo Zummo | 05 Sep 2021
A powerful, open-source penetration testing tool has become the password cracker of choice on the dark web, and its users are increasingly focused on getting access ...
Read More >
Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Darkfeed Case Study: How A Financial Services Customer Identified A Supply Chain Compromise

Dov Lerner | 05 Sep 2021
Threat actors constantly look for vulnerabilities in systems and networks. This includes efforts to crack RDP connections, since with remote access to an internal network, an actor can cause quite a bit of damage. With RDP credentials, an actor can exfiltrate sensitive data, deploy ransomware, or use the resources as a staging ground for a […]
Read More >
Dark Web Scraping

Dark Web Scraping

Dov Lerner | 02 Sep 2021
What is scraping, why is it so common among threat actors, and how can it jeopardize individuals’ privacy? Check out this post for the details you need.
Read More >