background.png

The Cyber Feed

Next Gen Managed Detection and Response Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

What You Need to Know About Code Repository Threats

Today’s software developers are under ever-increasing pressure to rapidly develop software - new capabilities in fast iterations. This has led to the more frequent use of open source code, leveraging ...

Read More

Game on: Detecting Cyber Threats at the FIFA World Cup

  As with other major sporting events, the 2018 FIFA World Cup has not only attracted spectators worldwide but a legion of cyber threats targeting fans of the tournament. It’s not surprising, as ...

Read More

Are You Vulnerable to Domain Hijacking?

The simple answer to the question as to whether you are vulnerable to Domain Hijacking is a resounding yes; your website and your business identity absolutely need to be protected from this threat. ...

Read More

Forrester Highlights CyberInt As Emerging DRP Solution In Growth Stage

Forrester maintains that DRP solutions allows security pros to prevent, “breaches of trust, such as fraud, data theft, and other, more insidious cyberactivity occurring on social, deep, and dark ...

Read More

Warning: Fifth-Generation Phishing Kits are here – A New Research by Check Point and CyberInt

The Dark Web has become a bazaar for cyber criminals looking for sophisticated off-the-shelf ready-to-use malware. The latest example is a product called the “(A)pache Next Generation Advanced ...

Read More

Opportunities and Vulnerabilities: Coming to Grips with Today’s Many Attack Vectors

Digitalization has spread wide - BYOD, business-oriented apps, ordering from and paying vendors, and SaaS platforms all connect suppliers and customers in real-time. Collaboration platforms like ...

Read More

Spoofing and Business Email Compromise Attacks - Planning Your Best Defense

Business Email Compromise (BEC) attacks target specific individuals in a company, usually executives. In piecing together compromised data by studying a company, its main players, and social media, ...

Read More

Get Down and Virtual at RSA 2018

Visit the CyberInt booth and play the Virtual Reality game ‘The Usual Suspects’ at RSA, San Francisco April 16-20, 2018. Identifying an Indicator of Compromise (IOC) has grown in sophistication and ...

Read More

Are Your Vendors Supplying Increased Business Value or Risk?

You trust your vendors enough to do business with them, but would you trust them with your cybersecurity? The reality is, you already do.

Read More

Proceed with Caution: The Rise of Malicious Apps

Digital storefronts can be vandalized and stolen from just the same as physical ones can. Your firm’s online presence and that of your employees is an attack surface which is often targeted by ...

Read More

SUBSCRIBE

download.jpg