Cyber Security

Sharp Rise in Mining-Related Malware on the Russian-speaking Underground

by Verint CTI (powered by SenseCy)

posted at June 5, 2018

Verint’s powerful portfolio of interception and monitoring solutions provides full monitoring and operational value. Dedicated systems address separate real-time and retroactive investigation needs, for lawful monitoring, field operations and background research. In the case below, we have used our Cyber and Webint suite to constantly monitor, collect and analyze malware-related items, to gain actionable intelligence

Verint Completes its First Cyber Course for the Magshimim Plus Program

by Sharon Ginsburg

posted at May 6, 2018

As part of its Corporate Social Responsibility, Verint joined forces with the Magshimim Cyber Education Program.  The Magshimim Plus program was created for pre-army students with an aptitude for computer and cyber studies.  Founded in 2010 by the Rashi Foundation and the Ministry of Defense, Magshimim has now become a national program. Volunteers at Verint

Watch Out: The FastDataX campaign – DNSChanger is Back!

by Verint Research Lab

posted at July 31, 2017

Verint’s Cyber Research team has recently discovered evidence of a new campaign for a variant of the infamous DNSChanger Trojan, which, as its name implies, alters a computer’s DNS entries to point toward rogue name servers. The new Trojan was identified through alerts in a Verint Threat Protection System (TPS) installation, which were triggered by its behavioral C&C

Lateral Movement and Threat Actors – Watch your network!

by Eddie Harari

posted at July 3, 2017

Cyber attacks are not only becoming more frequent, they are also becoming more complex, with attackers often using a range of techniques to get malware into your computer. One preferred method is to spread malware throughout the network, in an effort to locate network assets. This blog explains this particular method, it also explains why