Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CyberInt

Below you will find reports with the source of “CyberInt”

image from Cyber Security Trends Forecast 2023

Cyber Security Trends Forecast 2023

The cybercrime industry is very dynamic and develops and morphs daily. As a result, new trends keep on emerging that demand us to be on top of things in order to keep our organizations safe and secure. This report will focus on all the major and relevant security trends of 2022 that we can learn from, as well as what can we conclude and predict about how these threats could reveal themselves and change in 2023.

(more available)
Added: March 7, 2023
image from Social Media: A Growing Risk For Corporate Security

Social Media: A Growing Risk For Corporate Security

From the report, “Unless companies come to realize that their security perimeters must grow beyond the corporate firewall to encompass social media networks and other areas such as the Dark Web, then the global cost of cyber crime will continue to mushroom.

(more available)
Added: December 5, 2018
image from Threat Intelligence Bulletin: Deloitte Breach

Threat Intelligence Bulletin: Deloitte Breach

This report, prepared by CyberInt, summarises the currently known information regarding the recent breach at Deloitte, one of the ‘big four’ accounting firms, and includes a timeline of events, what is known of the breach itself as well as the aftermath.

(more available)
Added: December 5, 2018
image from Threat Intelligence Report: Mobile Malware As A Service

Threat Intelligence Report: Mobile Malware As A Service

Long gone are the simple days of malware threats only being associated with the computers on our desks or at our business offices. Today, we’ve all become accustomed to malware infiltrating our homes and pockets across a variety of platforms, be that our telephones, tablets, smart TV or even ‘connected’ devices such as our fridges. Whilst malware can be tailored for different platforms and differ in their abilities or functionality, the overall taxonomy remains very much the same. Back in the ‘halcyon’ days many malware authors released their wares for fun, ‘lulz’ in modern parlance, today most are criminally motivated and driven by financial gain, ideology, revenge and nation state doctrine. The objective of these attacks, and the compromised devices or networks, are typically similar and result in the threat actor gaining access, leading to the theft of confidential and personal information, or disrupting the operations and functionality.

(more available)
Added: December 5, 2018
image from KRACK Attack: WPA2 Wi-Fi Vulnerability

KRACK Attack: WPA2 Wi-Fi Vulnerability

This report takes a look at the “Key Reinstallation Attack” VULN that works against all modern protected Wi-Fi- networks.

Added: December 5, 2018
image from Sentry MBA: A Tale On The Most Widespread Used Credential Stuffing Attack Tool

Sentry MBA: A Tale On The Most Widespread Used Credential Stuffing Attack Tool

This report describes the Sentry MBA, a credential stuffing attack tool, which has become the most popular cracking tool among threat actors in recent months. Among the reasons for its popularity, the Sentry MBA hacking tool is freely and publicly available, extremely effective, and easy to operate.

(more available)
Added: December 5, 2018
image from Bad Rabbit: New Ransomware Wracking havoc

Bad Rabbit: New Ransomware Wracking havoc

This paper provides information on Bad Rabbit a new ransomware roving the internet.

Added: December 5, 2018
image from Threat Intelligence Bulletin

Threat Intelligence Bulletin

This report offers information related to an ATM Jackpotting kit for sale on darknet.

Added: December 5, 2018
image from A Hidden Economy: Retail Fraud In The Digital Age

A Hidden Economy: Retail Fraud In The Digital Age

Working with some of the world’s leading online brands, CyberInt takes a look at the fraud threats that retailers receive in the cyber world.

(more available)
Added: December 5, 2018
image from Threat Intelligence Report: QR Code Threat Landscape

Threat Intelligence Report: QR Code Threat Landscape

This paper offers insight into QR code usage and user interest and suggests that organizations should take time to consider and familiarize themselves with the potential security ramifications.

(more available)
Added: December 5, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)