Threat Intelligence

Cybersecurity Threat Reports

Deepwatch Threat Intelligence analysis and remediation recommendation for vulnerabilities and exploits.

Filter by:

CUPS Exploitation – “I got my ticket for the long way ’round (your Linux machines)”

Discover the critical vulnerabilities in the Common UNIX Printing System (CUPS) that could lead to Remote Code Execution (RCE) on Linux/Unix systems. Learn how to detect and mitigate these risks effectively.

Catching the Phish – Detecting Evilginx & AiTM

Discover the rising threat of Adversary in the Middle (AiTM) attacks and learn how to protect your accounts with multi-factor authentication (MFA). Stay informed and secure in the digital landscape.

Social Engineering Overload

Learn how attackers use spam flooding, vishing, and Windows utilities to steal credentials and install tunnels in this detailed analysis

Gootloader Poisoned Blogs Uncovered by Deepwatch’s ATI Team
How Deepwatch’s Adversary Tactics and Intelligence Team Approaches Cyber Threat Intelligence

Understand Cyber Threat Intelligence and how the Deepwatch Adversary Tactics and Intelligence team approaches it

Deepwatch ATI detects and responds to never before discovered backdoor deployed using Confluence vulnerability for suspected Espionage
Meet the Threat: The Inside Workings of Magecart Breaches

Learn about the magecart breaches that have been attributed to cyber criminal elements at Ticketmaster, British Airways and more. Find details on the breaches

Profile of an Adversary – FIN7

The majority of companies in the Retail or Hospitality industries are sadly familiar with FIN7 and face many challenges in various environments. Learn more about FIN7

Let's Talk

Ready to Become Cyber Resilient?

Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.