The Cyber Feed

Next Gen Managed Detection and Response Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

Threat Hunting with The MITRE ATT&CK™ Framework

The MITRE ATT&CK™ Framework Cyber attacks are becoming more sophisticated every day. Cyber criminals are honing living off the land (LotL) techniques , exploiting off-the-shelf and pre-installed ...

Read More

Konni Malware Campaign

Throughout 2019 CyberInt Research observed multiple events related to Konni, remote administration tool, observed in the wild since early 2014. The Konni malware family is potentially linked to ...

Read More

Reduce Time To Remediate Threats: Lessons from a major US retailer

2019 has become another record-breaking year in eCommerce. This unprecedented growth has a dark side - since an overwhelming 71% of security incidents are financially motivated, digital retailers are ...

Read More

Awarding CyberInt’s Security Efforts

CyberInt researchers invest significant time and effort into researching and trying to mitigate the next cyber attack. In addition, breach reports that detail the mode of attack and how it was ...

Read More

Reactive vs Proactive: Hunting for Threats with Targeted Cyber Threat Intelligence

The sophistication of hackers and the number of malware threats have increased over the last few years, with security teams grappling to stay ahead of the curve to protect their organizations. ...

Read More

Social Media: A Holiday Haven For Threat Actors

Updated as of November 26, 2019 It’s the most wonderful time of the year for online retailers. Global consumers are predicted to spend $768B between November 1st and December 31st and while this ...

Read More

Anti-fraud Checklist: How Prepared Is Your Online Store for the Holiday Rush?

It’s that time of the year again, with everyone looking forward to and talking about the impending holiday season. Of course, this is very much true for the online retail industry. According to ...

Read More

Part 3: Protecting The Customer Journey: Learning from 2019’s High Profile Breaches and Attacks

Consumers today are using more touchpoints than ever to interact with brands. Customer journeys are becoming increasingly complex, spanning multiple channels, assets, and involving multiple ...

Read More

Office Templates and GlobalDotName - A Stealthy Office Persistence Technique

A few weeks back, I was researching various adversarial techniques, when a couple of minutes into the research of T1137 (Office Application Startup), there appeared to be a yet-to-be-documented ...

Read More

How to Increase your Organization’s Cyber Resilience

The 2019 Capital One Data Breach was one of the largest data breaches in the history of the banking industry, revealing sensitive data of over 100 million US and Canadian consumers and businesses, ...

Read More