Verint Blog

Arabic-Speaking Threat Actor Recycles the Source Code of Popular RAT SpyNote and Sells it in the Dark Web, as New

by Verint Cyber Threat Intelligence Research Team

posted at September 12, 2019

Recent Android RAT, posted for sale on the dark web, MobiHok v4, seems to be based on the source code of the Android RAT SpyNote, which was leaked in 2016.

Video-Based Command and Control: Enhancing and Unifying Security Operations

by Jeffrey Lewis

posted at September 5, 2019

In today’s technology-driven world, most business operations and security decisions are based on data. When it comes to protecting what matters most to an organization, security managers and operators rely on information from a multitude of systems and solutions, such as video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection.   However, this

Experience the Next Evolution of Situational Intelligence and Video-Based Security with Verint at GSX 2019

by Jeffrey Lewis

posted at August 23, 2019

We continue to see threats to mission-critical organizations evolve and become more prevalent and sophisticated.  Hostile nation-states, growing workplace threats and violent extremism are putting pressure on organizations to take additional steps to protect what matters most. Whether that’s people, property, assets, or all of the above, when left unchecked, the security threats facing today’s

Part 2: 5 Challenges to consider while preparing for 5G Lawful Interception

by Tom Sadon

posted at August 22, 2019

Missed part 1? Read more about modern LI in 5 Things to Consider When Choosing a Modern Lawful Interception Monitoring Center. The introduction of 5G network technology, places law enforcement and intelligence agencies in a new race against criminals and terrorists, bringing new challenges to lawful interception. Existing lawful interception (LI) monitoring centers that are