Verint Blog

Jihadist World Uncovered Online by Our Web Analysts

by Paz BenNun

posted at January 23, 2019

Through extensive online research conducted over the last year, Verint’s Terrogence team of Web Intelligence analysts has recognized two significant and related shifts relating to content emanating from the jihadi world: A rise in awareness of jihadi content on social media platforms, both from the platform administration and from users. Increasing usage in encrypted mobile

Data Integration: The Sum is Greater Than All of its Parts?

by Moranne Yaari

posted at December 25, 2018

“The Whole is Greater than the Sum of its Parts”. Aristotle said it first. But he was using a first generation intelligence center. And the bad guys were communicating with smoke signals and carrier pigeons. In my last blog I discussed how with a modern fusion center you should not fear having “too much” data

Growing Awareness of the Darknet in China following Huge Domestic Database Breaches

by Verint Cyber Threat Intelligence Research Team

posted at November 27, 2018

In recent weeks, we have identified a growing awareness on Chinese security blogs and mainstream media, to the existence of the Darknet, and the activities of Chinese users on its platforms. The focus is mostly on the sale of leaked data, mainly of Chinese citizens. One of these leaks pertained to the Huazhu hotel group

Breaking Down Builder-encrypted RAT

by Nadav Lorber

posted at November 7, 2018

The emerging trend of Fully Undetectable (FUD) malware builders is not new to our research team. However, in light of the wide variety of techniques that the malware authors keep developing, it’s obvious that we will always encounter malicious code execution tricks that successfully bypass traditional anti-malware solutions. This blog post is actually a case