Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberint

Cybersquatting - Preventing, Detecting, and Responding To It

Cybersquatting, or domain squatting, is registering, trafficking in, or using an internet domain name solely with the bad faith intent of profiting from the goodwill generated by a trademark that belongs to someone else. It refers to a bad faith abusive registration of a domain name in violation of someone else’s trademark rights.

Cyberint Mentioned in Three 2022 Gartner Reports

We are proud to announce that Cyberint has been named a Sample Vendor in the ‘Hype Cycle for Security Operations, 2022’ under three categories: Digital Risk Protection Services; External Attack Surface Management and Threat Intelligence Products & Services. Cyberint has also been named in 2022 Gartner reports ‘Emerging Tech Impact Radar: Security’ and ‘Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services’.

Phishing Attacks: A Summary of Phishing In All Its Forms

A phishing attack is a fraudulent email pretending to be from a safe, familiar, or reliable source intended to induce the email recipient to reveal personal information such as financial information, personally identifiable information (PII), Passwords, or credit and bank account numbers to the writer.

Cyber Threats on Sale - A Black Friday Special Intelligence Report

Threats to the e-commerce industry have increased in the last year as multiple threat actors have complicated their attacking tactics, tools and procedures in order to gain higher efficiency and quick profit. The following report will cover the major threats in the upcoming holiday season and provide critical information and mitigation steps. Over the course of time, a trend that started in the United States has been adopted across the globe.It is the Friday after Thanksgiving, called Black Friday.

Twitter's New Verified Badge Causes Security Issues

Over the past weeks, Elon Musk’s purchase of Twitter has drawn the attention of people worldwide, even those who are not using the platform. One of many ideas Musk had while purchasing Twitter was to allow users to pay $8 per month and receive the blue check mark. Until this decision, only verified celebrities, companies, and journalists by Twitter, received the mark and it helped fight against fraud and identity theft incidents.

Avoiding the Dangers of the Dark Web

We’ve all heard of the “dark web,” but many of us have no idea what it is and even less of how to access it. The Dark Web, a global challenge to law enforcement, is a region of the World Wide Web accessible only through special software permitting anonymity. Your search engine cannot index the Dark Web’s pages. They are not viewable on your standard web browser, requiring special software or configuration for access.

Guacamaya Group

The Guacamaya group is a fairly new hacktivist group based in Latin America. The group was first seen around March 2022 as they released sensitive data of several companies based in Chile, Ecuador, Brazil and Colombia. As mentioned, the group is mainly focusing on LATAM but dabbles every now and then with campaigns in Russia. The group is defined as a data leakage threat group, which means they do not encrypt but only leak the stolen data, often they do it for free.

A Guide to Open Source Intelligence (OSINT)

Open-source intelligence (OSINT) is essentially any information that can be obtained from publicly available sources. The practice of collecting this information is not new; in fact, in the early 1990s, the Deputy Director of the CIA asserted that over 80% of CIA analysis came from open-source information. Maps, phone books, printed materials, news reports, and other forms of content can provide a lot of information if one knows where and how to look.