Threat Intelligence Blog

Dark Web Scraping

Dark Web Scraping

Dov Lerner | 02 Sep 2021
What is scraping, why is it so common among threat actors, and how can it jeopardize individuals’ privacy? Check out this post for the details you need.
Read More >
ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

Michael Angelo Zummo | 09 Aug 2021
A Remote Access Trojan (RAT) dubbed ‘ToxicEye’ continues to maintain wide popularity in the underground three years after its initial release. This malware, used to infect devices via the Telegram messaging app, provides threat actors complete control over a victim’s device.
Read More >
Beyond the Buzzwords: Actionable Insights

Beyond the Buzzwords: Actionable Insights

Gilad Levy | 05 Aug 2021
In the previous posts we’ve explored the TI buzzwords “real-time” and “AI”.  We’ve ventured beyond the hype and learned how to understand whether or not a certain solution is suitable for you. Our buzzword this week is “actionable insights” – a term that has been beaten by tech marketers harder than a birthday piñata. We’ll take a deeper look […]
Read More >
Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Building the Cyber Threat Intelligence System of Tomorrow: Key Takeaways from Re:con21

Meira Primes | 04 Aug 2021
If there is one constant in the world of cybersecurity and cyber threat intelligence (CTI), it’s how quickly it moves. But while the threats cybersecurity professionals confront and the technologies at their disposal progress rapidly, the size of their workforce does not keep up with demand. The frequency, scope, and cost of cyberattacks keep rising, […]
Read More >
Ransomware Retail: Underground Remote Access Markets

Ransomware Retail: Underground Remote Access Markets

Dov Lerner | 22 Jul 2021
A major component in the rise of the severity and scope of ransomware attacks is the availability of remote access for purchase on the deep and dark web.
Read More >
The Cybersecurity Workforce, Knowledge and Skill Gaps

The Cybersecurity Workforce, Knowledge and Skill Gaps

Lisa Courturier | 22 Jul 2021
Read the recap from PrivSec Global Conference on the topic of The Cybersecurity Workforce, Knowledge and Skill Gaps.
Read More >
Looking Beyond CVSS Scores for Effective Vulnerability Management

Looking Beyond CVSS Scores for Effective Vulnerability Management

Sumukh Tendulkar | 22 Jul 2021
Vulnerability management is a critical part of cybersecurity, yet the conventional approach often relies on outdated and incomplete info. Here’s a more promising alternative.
Read More >
How Cybersixgill’s Dynamic Vulnerability Exploit Score (DVE) Simplifies Vulnerability Management for Swimlane Customers

How Cybersixgill’s Dynamic Vulnerability Exploit Score (DVE) Simplifies Vulnerability Management for Swimlane Customers

Laurie Ben-Haim | 13 Jul 2021
Swimlane customers can now use the Cybersixgill Dynamic Vulnerability Exploit Score (DVE) to take on the challenge of vulnerability management.
Read More >
Cybersecurity Meets Business: 4 Key Trends from Our PrivSec Global Discussion

Cybersecurity Meets Business: 4 Key Trends from Our PrivSec Global Discussion

Sumukh Tendulkar | 08 Jul 2021
Risk ∝ (Threat * Vulnerability) / Controls More threats or more unmitigated vulnerabilities means more risk. More effective controls means less risk. We all know this and most of us have experienced it. It really is straightforward. However, full 68% of executives say their cyber risk is increasing. Covid-19 and digital transformation meant even more increase in […]
Read More >
A Better Way to Prioritize Patching with Dark Web Intelligence

A Better Way to Prioritize Patching with Dark Web Intelligence

Laurie Ben-Haim | 01 Jul 2021
When the Microsoft Exchange server vulnerabilities were announced in March, it reportedly took attackers only five minutes to begin scanning networks, finding out which specific systems were most vulnerable and sharing proof-of-concept codes. While these vulnerabilities and others have been catastrophic, only one of 16 vulnerabilities is actually exploited. The mounting pressure on companies to defend themselves […]
Read More >