TRENDING
TARGETED INDUSTRIES -> IT & ITES | Government & LEA | Technology | Healthcare | EducationTARGETED COUNTRIES -> United States | Russian Federation | China | United Kingdom | GermanyTARGETED REGIONS -> North America (NA) | Europe & UK | Asia & Pacific (APAC) | Middle East & Africa (MEA) | Australia and New Zealand (ANZ)IOCs -> a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 | 7bdbd180c081fa63ca94f9c22c457376 | 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 | 2915b3f8b703eb744fc54c81f4a9c67f | 2.2.2.2CVEs -> CVE-2024-21887 | CVE-2023-46805 | CVE-2024-21893 | CVE-2024-21412 | CVE-2021-44228TECHNIQUES -> T1082 | T1140 | T1083 | T1190 | T1486TACTICS -> TA0011 | TA0007 | TA0010 | TA577 | TA0005TAGS -> security | the-cyber-express | firewall-daily | the-cyber-express-news | malwareTHREAT ACTORS -> Lockbit | Blackcat | VoltTyphoon | Lazarus | MidnightBlizzardMALWARE -> CobaltStrike | Lockbit | Mirai | Xmrig | DarkgateSOURCES -> Darkreading | Bleepingcomputer | The Hacker News | The Cyber Express | Infosecurity Magazine
CRIL Updates
Brokewell: A New Android Banking Trojan Targeting Users In GermanyLOCKBIT Black’s Legacy: Unraveling the DragonForce Ransomware ConnectionThreat Actor Profile: TransparentTribeCritical D-Link NAS vulnerability under active exploitation FatalRAT’s New Prey: Cryptocurrency Users in the CrosshairsElevating the Stakes: The Enhanced Arsenal of the Fake E-Shop CampaignSolana Drainer’s Source Code Saga: Tracing Its Lineage to the Developers of MS DrainerWarzoneRAT Returns with Multi-Stage Attack Post FBI SeizureCGSI Probes: ShadowSyndicate Group’s Possible Exploitation of Aiohttp Vulnerability (CVE-2024-23334) Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions
Next-Generation
AI-Powered Cybersecurity Platforms
Tailored for Enterprises, Government, & Law Enforcement
Empower Your Defense Against Cyber Threats with Cyble Vision and Cyble Hawk: Experience Award-Winning
AI-Powered Cybersecurity
Latest Research Report
Threat Landscape Report 2023- 2024
Explore the depths of the cyber threat landscape with our comprehensive 2023-2024 report. Uncover the trends, tactics, and predictions that will shape the future of cyber security.
Beyond Threat Intelligence
Unlock Possibilities Beyond Threat Intelligence:
Comprehensive Solutions and Services Under One Umbrella, Empowering Your Security Ecosystem
Cyber Threat
Intelligence
Unlock Comprehensive Threat Intelligence with Cyble: Prioritize and Mitigate Risks Effectively
Dark Web & Deep Web Monitoring
Discover Dark Web Threats with Cyble's Advanced Technology
Attack Surface Management
Proactive Threat Detection for Web, Mobile, Cloud, IoT, and more
Vulnerability Management
Stay Ahead of Security Risks with Cyble's Zero-Day Vulnerability
Monitoring
Brand
Intelligence
Protect Your Brand with Cyble's Rapid Takedown Solutions
Takedown &
Disruption
Combat Online Fraud and Cybercrime with Cyble's Powerful Takedown Services
Customers Rated Cyble Vision Platform: 4.6/5 Stars
Read what the top companies across the world have to say about our platform.
Latest blogs by Cyble Research and Intelligence Labs (CRIL)
Banking Trojan
Brokewell: A New Android Banking Trojan Targeting Users In Germany
April 25, 2024
Read More →
Ransomware
LOCKBIT Black’s Legacy: Unraveling the DragonForce Ransomware Connection
April 24, 2024
Read More →
See Cyble in Action
Request a personalized demo and discover how our advanced threat intelligence can empower your organization’s cybersecurity strategy. Witness the integration of our solutions with your existing security tools and understand how we can help you navigate the complex landscape of cyber threats.