cyber threat intelligence
The outbreak of the Coronavirus demonstrates how agile and quick cyber attackers are to exploit a vulnerability or human weakness. Read here about recently identified malicious campaigns related to the COVID-19 pandemic.
Domain monitoring, vulnerability monitoring and alert monitoring are just a few of the things that automation can improve. Read more about the use of automation in CTI
Verint’s Cyber Threat Intelligence (CTI) Group analysis of the top 20 vulnerabilities that are currently exploited by attack groups worldwide. Provides security professionals with an incentive to improve their patching management activities.
The Ultimate Threat Actor Landscape report provides an in-depth analysis of threat actors operating in the world today, revealing detailed view of each threat actor, including the attacker’s origin, motives, attack techniques, and more, as well as a regional and sectorial analysis of the different threat actors.