Cyberint News

Cyberint News

Cyberint in the News

This month we were heavily featured in the press for two main reasons.

Firstly, the acquisition was widely reported. Thanks to all the support and celebration we received from major publications such as Dark Reading, Security Week, SC media, Cyber Security News and more.

Secondly, the Cyberint Research Team discovered a new type of malware called UULoader that is being used by threat actors to deliver next-stage payloads like Gh0st RAT?and?Mimikatz.

The team reported that it's distributed in the form of malicious installers for legitimate applications targeting Korean and Chinese speakers. Thanks to The Hacker News, SC Media, Dark Reading and more for reporting on the discovery. See the full report below ↓

RansomHub: The New Kid on the Block to Know

The RansomHub ransomware group has emerged as a significant player in the ransomware landscape. As of August 22, 2024, the group has targeted 190 victims across the globe. Learn more about the group in the report.

Read the Report

The Phishing & Impersonation Protection Handbook

Phishing attacks remain as prevalent as ever – and are actually getting worse. The frequency of phishing incidents surged by 1,265 percent in 2023, due especially to the advent of generative AI technology.

This guide provides guidance on these topics by discussing the four main types of phishing impersonation, then offering tips on defending against each one.

Read the Report

Product Updates

The Cyberint team is continuously innovating and introducing new features to the Argos platform. This month, we released the following improvements:

View and export the details of risks discovered in your 3rd party suppliers

Cyberint’s Supply Chain Intelligence module now offers a more granular view of exposure items & risks for third-party suppliers. You can download a CSV/PDF file to simplify notifying vendors & collaborating on fixing high-severity security issues.

New Brand Management Settings to Protect Your Trademarks

The new Brand Management screen allows Admins to create and modify brands for continuous monitoring on the Argos platform. You can upload favicons, logos, and resources to help detect phishing sites impersonating your brands.

Have CVE alerts automatically closed when you update the vulnerable technology

If the vulnerable technology (specific to version) referenced in the CVE Alert is no longer observed then the Alert will be closed automatically. This enhancement will save you time and help you manage all alerts related to vulnerable technologies.

The Latest Content From Cyberint?

The Benefits of Multiple IOC Feeds

Having multiple IOC feeds from various sources is generally considered better than relying on a single feed because it provides a broader range of threat intelligence. Learn why in the blog.??

Read the Blog →

What's New in NIST 2.0?

Read on for guidance on what’s new in NIST 2.0 and how to get started building a cybersecurity strategy that aligns with the updated NIST requirements.

Read the blog →

Meet UULoader: An Emerging and Evasive Malicious Installer

Windows Installers (.msi files) are a known vector of malware distribution. Cyberint noticed an uptick in their usage. This led to the discovery of a new malicious installer being actively used in the wild.

Read the blog →

On the Hunt for Hunters Ransomware

Amid the disruption of the Hive ransomware group by law enforcement agencies, Hunters International emerged onto the cyber scene in Q3 of 2023.

Read the blog →

Upcoming Events

InfoSec World?

We'll be hanging out at InfoSec World! Come join us for a demo of our platform and to learn about our latest updates at booth #818

Meet Us There →

Strategy Days

Come meet us at Strategy Days! Come join us for a demo of our platform and to learn about our latest updates.

Philippines Customer Event

Join Cyberint's in-person event in the Philippines on September 24th. Strengthen your organization’s security by gaining insights into the current threat?landscape and learn directly from our clients about their effective threat management strategies.??

Save Your Spot →

Join Us For These Webinars

On Demand: Unpacking NIS2 Requirements

Register for the Webinar →

Die NIS 2-Vorschriften: Wie man die Einhaltung der neuen Vorschriften sicherstellt

Register for the Webinar →

Bridging The Gap: How Your Cyber Program Can Improve Cross-Team Collaboration

Register for the Webinar →

Demonstrating Cyber Success: How To Report Success & Value To Executive Stakeholders

Register for the Webinar →




要查看或添加评论,请登录

Cyberint, a Check Point Company的更多文章

社区洞察

其他会员也浏览了