background.png

The Cyber Feed

Next Gen Managed Detection and Response Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

Nothing fine about it - Sotheby's data breach

Following reports on social media[1] and notification to the California Department of Justice[2], yet another retailer is preparing to communicate details of a breach to their customers. In this ...

Read More

Welcome to the Marriott, where you can check out but never really leave

Old news: On November 30th, Marriott disclosed a breach that compromised about 500m data records of Starwood Hotels customers. The breach was first detected in September, with the full scope not ...

Read More

Use cases: Top Online Retail Fraud Attack Vectors

The holiday shopping season is prime time for online retailers, but it’s also a busy time for cyber  criminals as they prepare their latest attacks to entice shoppers eager for deals and discounts. ...

Read More

Who Will Make the Most Out of Your Holiday Campaign? You or Those Cyber Criminals?

Last year, Cyber Monday reached a new record of $6.6 billion  in sales. Black Friday and Thanksgiving Day were close behind at $5.03 billion and $2.87 billion respectively. No doubt it’s the most ...

Read More

Top 10 Digital Attack Vectors To Watch Out For

“Traveling through hyperspace ain't like dusting crops, farm boy.” – Han Solo in Star Wars – A New Hope

Read More

Breach Report: PROFILING MAGECART eCommerce Scraping Attacks

Recent payment scraping attacks have been plaguing online retailers against such high profile companies such as Ticketmaster, British Airways, ABS-CBN, and Newegg. Given the similarities of the ...

Read More

Anti-fraud Checklist: How Prepared Is Your Online Store for the Holiday Rush?

It’s that time of the year, with everyone looking forward to and talking about the impending holiday season. Of course, this is very much true for the online retail industry. For many online ...

Read More

CyberInt Joins R-CISC Community to Bolster U.S. Retail Cyber Security

TEL AVIV, Israel and WASHINGTON, September 27, 2018 /PRNewswire/ 

Read More

Protecting Your Cryptocurrency Wallet

Do you own or are you thinking of buying bitcoin? Find out the common methods hackers use to steal cryptocurrency and the steps you can take to protect your cryptocurrency wallet.

Read More

What You Need to Know About Code Repository Threats

Today’s software developers are under ever-increasing pressure to rapidly develop software - new capabilities in fast iterations. This has led to the more frequent use of open source code, leveraging ...

Read More

SUBSCRIBE

download.jpg