Threat Landscape

Next Gen Managed Detection and Response Starts Here.

BAD JOB APT Fake Vacancy Campaign Targeting Saudi Arabian Petro-Chemical Industry

  Following the recent discovery of suspicious script files exposed on dynamic DNS (DDNS) hosts, presumably due to misconfiguration by the threat actor given that the ‘directory listing’ option was ...

Read More

Wordpress Mass-Injections

Obfuscated JavaScript Chain  During a recent investigation using CyberInt’s Argos™ platform, a number of websites were identified as using the popular open-source WordPress content management system ...

Read More

Cryptojacking - Making You Mine!

Cryptojacking Explained There’s a new danger to your computer, but one that doesn’t involve your PII, passwords, or credit card numbers. These attackers want something far more fundamental: your ...

Read More

Cisco Smart Install (SMI)

Over the past forty-eight hours, since 5 April 2018, there have been numerous open source reports of wide spread cyberattacks targeting Cisco networking devices, specifically switches using the Cisco ...

Read More

Threat Brief: Account Checkers And Credential Stuffing

  Cyberint has observed increased use and availability of ‘account checker’ tools that allow threat actors to bulk test credentials, typically obtained from data breaches or leaks, against a variety ...

Read More

Managing Cloud Data-Loss Risk in A ‘Cloud First’ World

Cloud adoption and services remain among the top trends and IT strategies, as does cyber security. As a result, enterprises, federal agencies and startups alike are adopting a “cloud first” policy in ...

Read More

How to Use JPEXS for a Foolproof Dynamic Flash Analysis

We come across many flash based applications during our penetration tests for customers.

Read More

A New Vulnerability Exposes 900 Million Users to Legitimate Looking Phishing Emails

Our CyberOPS team did it again.

Read More

Why Your Organization May Be More Vulnerable Than You Think To Cross-Site Scripting Attacks

Cross-site scripting (XSS) is one of the greatest security threats organizations face. Malicious codes are injected into otherwise trusted websites using HTML, JavaScript, VBScript, ActiveX and Flash ...

Read More