JULY NEWS: OLYMPICS, NIS 2 AND RANSOMWARE
Cyberint, a Check Point Company
We turn intelligence into actions to proactively and effectively defend businesses against cyber threats
Hi there,
Everyone around the world this month is celebrating the Olympics and it's no different here at Cyberint, we're glued to our screens. As with any major global event, cyber threats emerge. See our report and our webinar for all the details on emerging threats.
This month we are also closely watching the ransomware industry, with the latest ransomware report being released summarizing Q2 2024. You can read more about that below.
We've also been working hard to bring you lots of juicy content and webinars. Don't miss our webinar on NIS 2 at the end of August! See more below↓
OLYMPICS 2024: When Cybercriminals Join the Arena
The Olympics are kicking off and as usual the cyber criminals are getting in the game, but who are the targets? What motives do they have? And how will they hit? Read our guide to see what our Threat Intelligence Analyst Ilana T has to say:
Ransomware Report: Q2 2024
The latest ransomware update is out. Juicy nuggets include:
Join Us For These Webinars
This month we bring you a webinar on the new NIS 2 Requirements:
The Latest Content From Cyberint?
Handala Hack: What We Know About the Rising Threat Actor
The Handala Hacker Group takes its name and symbol from Handala, a character created by Palestinian political cartoonist Naji al-Ali in 1969. Their activities are characterized by sophisticated cyber-attacks, including phishing?campaigns, ransomware, and website defacements.
领英推荐
CrowdStrike Outage Aftermath: Threats & IOCs
CrowdStrike released a new update on their Falcon Sensor product. Unfortunately, the update caused technical issues, resulting in major outages globally to Microsoft Windows machines. The issue has also led to a series of cyber attacks in its aftermath.
How Big is Too Big (Of a Password List)?
For both white-hat and black-hat operators, the infamous “RockYou” lists have been a staple of the cyber-security landscape for well over a decade. This most recent incarnation of the “RockYou” lists, dubbed “rockyou2024.txt" has been making headlines, but how real a threat is it??
Why and how to perform Telegram monitoring to protect your business
For threat actors, the Telegram app, which emphasizes user privacy, has become a favored hangout. Telegram monitoring, however, is not as simple as logging on and asking the bad guys what they’re up to. It’s a complex process. We look into how to do it in our blog.
Cyberint in Politico and Dark Reading
This month our research was featured in Politico and Dark Reading. Read the full article on the link below:
Events this Month
Last month we attended 4 events, a partner event with Elcore in Azerbaijan, a partner event with ITSDI Philippines, a Defy Partner event in Texas and Cybersec Indonesia. Check out some pictures below.
Upcoming Events
Black Hat 2024?
We'll be hanging out at Black Hat! Come join us for a demo of our platform and to learn about our latest updates.
Cybersecurity expert leading premier consultancy safeguarding digital assets
7 个月Ransomeware is on the rise. This is a good report to read.