background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

Warning: Fifth-Generation Phishing Kits are here – A New Research by Check Point and CyberInt

The Dark Web has become a bazaar for cyber criminals looking for sophisticated off-the-shelf ready-to-use malware. The latest example is a product called the “(A)pache Next Generation Advanced ...

Read More

Opportunities and Vulnerabilities: Coming to Grips with Today’s Many Attack Vectors

Digitalization has spread wide - BYOD, business-oriented apps, ordering from and paying vendors, and SaaS platforms all connect suppliers and customers in real-time. Collaboration platforms like ...

Read More

Spoofing and Business Email Compromise Attacks - Planning Your Best Defense

Business Email Compromise (BEC) attacks target specific individuals in a company, usually executives. In piecing together compromised data by studying a company, its main players, and social media, ...

Read More

Get Down and Virtual at RSA 2018

Visit the CyberInt booth and play the Virtual Reality game ‘The Usual Suspects’ at RSA, San Francisco April 16-20, 2018. Identifying an Indicator of Compromise (IOC) has grown in sophistication and ...

Read More

Are Your Vendors Supplying Increased Business Value or Risk?

You trust your vendors enough to do business with them, but would you trust them with your cybersecurity? The reality is, you already do.

Read More

Proceed with Caution: The Rise of Malicious Apps

Digital storefronts can be vandalized and stolen from just the same as physical ones can. Your firm’s online presence and that of your employees is an attack surface which is often targeted by ...

Read More

Who's The Boss? Show Initiative and Train Your Leaders on Cyber Security Risks

Top executives already face tremendous pressure to reach financial goals and hire and maintain productive employees, in addition to a long list of other priorities. Now, they must also contend with ...

Read More

Winter Olympics Threats Snowballing?

With the PyeongChang 2018 Olympic Winter Games well underway, CyberInt researchers have been hitting the cyber-slopes in order to further ‘carve up’ threats directed at the organisers and ...

Read More

Cutting Through The Noise: The Number One Challenge CISOs Will Face in 2018

There is one major cyber security pain point which is common across all industries and verticals. And it boils down to this: there are just too many vendors and solutions to choose from and there are ...

Read More

Social Media: A Heaven For Cyber Criminals

The way users interact with brands is changing. There are a 3.03 billion active social media users worldwide, and according to Yahoo’s Flurry, in 2016 time spent on social apps increased by a ...

Read More

SUBSCRIBE

download.jpg