Verint Blog

How Threat Actor Profiling Enhances Security Resilience – Part 1

by Ben Kapon

posted at October 15, 2019

When it comes to threat actors capable of carrying out significant cyber-attacks and posing a real threat to your security resilience, there are more differences than similarities. Threat actor profiling is inefficient as long as it remains sporadic and dependent on different vendors’ research and publication of threat intelligence.

Arabic-Speaking Threat Actor Recycles the Source Code of Popular RAT SpyNote and Sells it in the Dark Web, as New

by Verint Cyber Threat Intelligence Research Team

posted at September 12, 2019

Recent Android RAT, posted for sale on the dark web, MobiHok v4, seems to be based on the source code of the Android RAT SpyNote, which was leaked in 2016.

Video-Based Command and Control: Enhancing and Unifying Security Operations

by Jeffrey Lewis

posted at September 5, 2019

In today’s technology-driven world, most business operations and security decisions are based on data. When it comes to protecting what matters most to an organization, security managers and operators rely on information from a multitude of systems and solutions, such as video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection.   However, this

Experience the Next Evolution of Situational Intelligence and Video-Based Security with Verint at GSX 2019

by Jeffrey Lewis

posted at August 23, 2019

We continue to see threats to mission-critical organizations evolve and become more prevalent and sophisticated.  Hostile nation-states, growing workplace threats and violent extremism are putting pressure on organizations to take additional steps to protect what matters most. Whether that’s people, property, assets, or all of the above, when left unchecked, the security threats facing today’s