Growing interest in the new SMBGhost Wormable vulnerability. Will it become the next WannaCry or NotPetya? Read our analysis and findings in this blog post.
The outbreak of the Coronavirus demonstrates how agile and quick cyber attackers are to exploit a vulnerability or human weakness. Read here about recently identified malicious campaigns related to the COVID-19 pandemic.
Verint’s Cyber Threat Intelligence (CTI) Group analysis of the top 20 vulnerabilities that are currently exploited by attack groups worldwide. Provides security professionals with an incentive to improve their patching management activities.
The CVE-2018-8174 vulnerability in Internet Explorer was found using OSINT tools and used by a nation-state group from North Korea. By constantly monitoring news outlets with WEBINT platforms, we discovered that the vulnerability was later adopted by cyber criminals globally, and was embedded inside exploit kits that were traded throughout dark-web platforms. The following is …