Cyberint News
Cyberint, a Check Point Company
We turn intelligence into actions to proactively and effectively defend businesses against cyber threats
Cyberint in the News
This month we were heavily featured in the press for two main reasons.
Firstly, the acquisition was widely reported. Thanks to all the support and celebration we received from major publications such as Dark Reading, Security Week, SC media, Cyber Security News and more.
Secondly, the Cyberint Research Team discovered a new type of malware called UULoader that is being used by threat actors to deliver next-stage payloads like Gh0st RAT ?and?Mimikatz .
The team reported that it's distributed in the form of malicious installers for legitimate applications targeting Korean and Chinese speakers. Thanks to The Hacker News, SC Media, Dark Reading and more for reporting on the discovery. See the full report below ↓
RansomHub: The New Kid on the Block to Know
The RansomHub ransomware group has emerged as a significant player in the ransomware landscape. As of August 22, 2024, the group has targeted 190 victims across the globe. Learn more about the group in the report.
The Phishing & Impersonation Protection Handbook
Phishing attacks remain as prevalent as ever – and are actually getting worse. The frequency of phishing incidents surged by 1,265 percent in 2023, due especially to the advent of generative AI technology.
This guide provides guidance on these topics by discussing the four main types of phishing impersonation, then offering tips on defending against each one.
Product Updates
The Cyberint team is continuously innovating and introducing new features to the Argos platform. This month, we released the following improvements:
View and export the details of risks discovered in your 3rd party suppliers
Cyberint’s Supply Chain Intelligence module now offers a more granular view of exposure items & risks for third-party suppliers. You can download a CSV/PDF file to simplify notifying vendors & collaborating on fixing high-severity security issues.
New Brand Management Settings to Protect Your Trademarks
The new Brand Management screen allows Admins to create and modify brands for continuous monitoring on the Argos platform. You can upload favicons, logos, and resources to help detect phishing sites impersonating your brands.
Have CVE alerts automatically closed when you update the vulnerable technology
If the vulnerable technology (specific to version) referenced in the CVE Alert is no longer observed then the Alert will be closed automatically. This enhancement will save you time and help you manage all alerts related to vulnerable technologies.
The Latest Content From Cyberint?
The Benefits of Multiple IOC Feeds
Having multiple IOC feeds from various sources is generally considered better than relying on a single feed because it provides a broader range of threat intelligence. Learn why in the blog.??
What's New in NIST 2.0?
Read on for guidance on what’s new in NIST 2.0 and how to get started building a cybersecurity strategy that aligns with the updated NIST requirements.
领英推荐
Meet UULoader: An Emerging and Evasive Malicious Installer
Windows Installers (.msi files) are a known vector of malware distribution. Cyberint noticed an uptick in their usage. This led to the discovery of a new malicious installer being actively used in the wild.
On the Hunt for Hunters Ransomware
Amid the disruption of the Hive ransomware group by law enforcement agencies, Hunters International emerged onto the cyber scene in Q3 of 2023.
Upcoming Events
InfoSec World?
We'll be hanging out at InfoSec World! Come join us for a demo of our platform and to learn about our latest updates at booth #818
Strategy Days
Come meet us at Strategy Days! Come join us for a demo of our platform and to learn about our latest updates.
Philippines Customer Event
Join Cyberint's in-person event in the Philippines on September 24th. Strengthen your organization’s security by gaining insights into the current threat?landscape and learn directly from our clients about their effective threat management strategies.??
Join Us For These Webinars
On Demand: Unpacking NIS2 Requirements
Die NIS 2-Vorschriften: Wie man die Einhaltung der neuen Vorschriften sicherstellt
Bridging The Gap: How Your Cyber Program Can Improve Cross-Team Collaboration
Demonstrating Cyber Success: How To Report Success & Value To Executive Stakeholders