Threat Intelligence

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform 02/08/2023 at 18:03 By Ionut Arghire Threat intelligence firm Cyble has raised $24 million in a Series B funding round co-led by Blackbird Ventures and King River Capital. The post Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform appeared first on SecurityWeek. This article is […]

React to this headline:

Loading spinner

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform Read More »

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding 27/07/2023 at 19:16 By Ionut Arghire Threat intelligence services provider QuoIntelligence has raised €5 million ($5.5 million) in seed funding. The post European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

European Threat Intelligence Firm QuoIntelligence Raises $5.5 Million in Seed Funding Read More »

Cybersecurity Public-Private Partnership: Where Do We Go Next?

Cybersecurity Public-Private Partnership: Where Do We Go Next? 24/07/2023 at 17:02 By Derek Manky Sharing threat information and cooperating with other threat intelligence groups helps to strengthen customer safeguards and boosts the effectiveness of the cybersecurity sector overall. The post Cybersecurity Public-Private Partnership: Where Do We Go Next? appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cybersecurity Public-Private Partnership: Where Do We Go Next? Read More »

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer 21/07/2023 at 19:19 By cybleinc Cyble Research and Intelligence Labs analyzes Threat Actors spreading Luca Stealer disguised as a beta version of Microsoft Crypto Wallet. The post Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer appeared first on Cyble. This article is an excerpt from Cyble View

React to this headline:

Loading spinner

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer Read More »

Is your browser betraying you? Emerging threats in 2023

Is your browser betraying you? Emerging threats in 2023 07/07/2023 at 07:02 By Help Net Security Network attacks (IPS detections) have remained relatively flat over the last three quarters, technically down a bit more than 3%, according to WatchGuard. “Organisations need to pay more active, ongoing attention to the existing security solutions and strategies their

React to this headline:

Loading spinner

Is your browser betraying you? Emerging threats in 2023 Read More »

How to cultivate a culture of continuous cybersecurity improvement

How to cultivate a culture of continuous cybersecurity improvement 06/07/2023 at 07:32 By Help Net Security Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does not create an impenetrable fortress against threats, it merely creates a baseline defense. So, how

React to this headline:

Loading spinner

How to cultivate a culture of continuous cybersecurity improvement Read More »

Multiple New Clipper Malware Variants Discovered in the Wild

Multiple New Clipper Malware Variants Discovered in the Wild 30/06/2023 at 17:04 By cybleinc Cyble analyzes various new Clipper malware variants specifically targeting Cryptocurrency users in the wild. The post Multiple New Clipper Malware Variants Discovered in the Wild appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to

React to this headline:

Loading spinner

Multiple New Clipper Malware Variants Discovered in the Wild Read More »

Cyware Snags $30M for Threat Intel Infrastructure Tech

Cyware Snags $30M for Threat Intel Infrastructure Tech 29/06/2023 at 20:38 By Ryan Naraine New York startup $30 million in new financing to fuel plans to take advantage of the demand for AI-powered threat-intel security tools. The post Cyware Snags $30M for Threat Intel Infrastructure Tech appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cyware Snags $30M for Threat Intel Infrastructure Tech Read More »

Unveiling Wagner Group’s Cyber-Recruitment

Unveiling Wagner Group’s Cyber-Recruitment 27/06/2023 at 15:18 By cybleinc Cyble analyzes Wagner Ransomware, a ransomware variant promoting recruitment into PMC Wagner amidst ongoing Russian internal conflict. The post Unveiling Wagner Group’s Cyber-Recruitment appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Unveiling Wagner Group’s Cyber-Recruitment Read More »

Trojanized Super Mario Game Installer Spreads SupremeBot Malware

Trojanized Super Mario Game Installer Spreads SupremeBot Malware 23/06/2023 at 15:24 By cybleinc Cyble analyzes SupremeBot, a crypto-mining client leveraging a trojanized Super Mario game installer to spread Umbral stealer malware. The post Trojanized Super Mario Game Installer Spreads SupremeBot Malware appeared first on Cyble. This article is an excerpt from Cyble View Original Source

React to this headline:

Loading spinner

Trojanized Super Mario Game Installer Spreads SupremeBot Malware Read More »

The Benefits of Red Zone Threat Intelligence

The Benefits of Red Zone Threat Intelligence 22/06/2023 at 16:31 By Derek Manky Incorporating Red Zone threat intelligence into your security strategy will help you stay on top of the latest threats and better protect your organization. The post The Benefits of Red Zone Threat Intelligence appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

The Benefits of Red Zone Threat Intelligence Read More »

Compromised ChatGPT accounts garner rapid dark web popularity

Compromised ChatGPT accounts garner rapid dark web popularity 21/06/2023 at 09:06 By Help Net Security Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing compromised ChatGPT accounts reached a peak of 26,802 in May 2023.

React to this headline:

Loading spinner

Compromised ChatGPT accounts garner rapid dark web popularity Read More »

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations 20/06/2023 at 16:11 By cybleinc Cyble investigates the Current vulnerability Threat landscape and observes distribution of Proof Of Concepts over Darkweb. The post Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations appeared first on Cyble. This article is an

React to this headline:

Loading spinner

Unmasking the Critical Risk of Internet-Exposed Assets to Public and Private Organizations Read More »

Malicious Tools in the Underground: Investigating their Propagation

Malicious Tools in the Underground: Investigating their Propagation 16/06/2023 at 19:04 By cybleinc Cyble Research & Intelligence Labs investigates the recent promulgation of Malicious Tools in underground forums. The post Malicious Tools in the Underground: Investigating their Propagation appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this

React to this headline:

Loading spinner

Malicious Tools in the Underground: Investigating their Propagation Read More »

Introducing the book: Visual Threat Intelligence

Introducing the book: Visual Threat Intelligence 16/06/2023 at 07:02 By Mirko Zorz In this Help Net Security video interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses his new book – Visual Threat Intelligence. The book covers a wide range of topics, including: Threat intelligence fundamentals and methodologies TTP, Diamond Model of Intrusion, MITRE ATT&CK,

React to this headline:

Loading spinner

Introducing the book: Visual Threat Intelligence Read More »

Cloud Mining Scam Distributes Roamer Banking Trojan

Cloud Mining Scam Distributes Roamer Banking Trojan 14/06/2023 at 16:35 By cybleinc Cyble analyzes a cloud mining scam leveraging phishing to distribute the Roamer banking trojan, targeting Android Crypto wallets and banking applications, aiming to steal sensitive information. The post Cloud Mining Scam Distributes Roamer Banking Trojan appeared first on Cyble. This article is an

React to this headline:

Loading spinner

Cloud Mining Scam Distributes Roamer Banking Trojan Read More »

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator 13/06/2023 at 19:21 By cybleinc CRIL analyzes WannaCry-Imitator Ransomware, a phishing gaming site targeting the Russian Gaming community The post Threat Actor Targets Russian Gaming Community With WannaCry-Imitator appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator Read More »

Over 45 thousand Users Fell Victim to Malicious PyPI Packages

Over 45 thousand Users Fell Victim to Malicious PyPI Packages 09/06/2023 at 12:31 By cybleinc Through the analysis of more than 160 malicious Python packages, CRIL reveals insights into the threat landscape associated with Python packages. The post Over 45 thousand Users Fell Victim to Malicious PyPI Packages appeared first on Cyble. This article is

React to this headline:

Loading spinner

Over 45 thousand Users Fell Victim to Malicious PyPI Packages Read More »

Unmasking the Darkrace Ransomware Gang

Unmasking the Darkrace Ransomware Gang 08/06/2023 at 15:02 By cybleinc New Ransomware Holds Similarities with LockBit Ransomware Ransomware continues to pose the most critical cybersecurity threat to organizations’ infrastructure. This malicious software encrypts victims’ files and extorts payment in return for the decryption key. The consequences of ransomware attacks can be severe, including financial losses,

React to this headline:

Loading spinner

Unmasking the Darkrace Ransomware Gang Read More »

Scroll to Top