×

Webinar: Why Dark Web Monitoring and Response is Essential

Cyber Threat Intelligence

Deepwatch Labs

Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.

Cyber Intel Brief: August 21-27, 2025

Brand Impersonation, SaaS Abuse, and $1M Scams: From Salesforce Data Theft to Citrix Exploits, Threat Actors Expand Their Playbook

Cyber Intel Brief: August 14-20, 2025

Fake ChatGPT Apps, Phishing-as-a-Service, and Zero-Days: Modular Backdoors and Exploited Vulnerabilities Push Cyber Threats Further Underground.

Cyber Intel Briefs

View All
Cyber Intel Brief: August 21-27, 2025

Brand Impersonation, SaaS Abuse, and $1M Scams: From Salesforce Data Theft to Citrix Exploits, Threat Actors Expand Their Playbook

Cyber Intel Brief: August 14-20, 2025

Fake ChatGPT Apps, Phishing-as-a-Service, and Zero-Days: Modular Backdoors and Exploited Vulnerabilities Push Cyber Threats Further Underground.

Cyber Intel Brief: August 7-13, 2025

From ClickFix to RomCom: Deceptive Delivery Tactics, WinRAR Exploits, and Ransomware Escalation Fuel New Wave of Targeted Attacks

Significant Cyber Events

View All
Operation I like to MOVEit, MOVEit; Active Exploitation of MOVEit Transfer Leads to Data Theft

An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product

Deepwatch Detects Webshell Activity After Suspected Exploitation of a Critical Vulnerability in Progress Software’s MOVEit Transfer Product

Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product

Early Discovery by Deepwatch ATI Finds Adobe ColdFusion Threats

Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do

Customer Awareness Advisory

View All

Cybersecurity Threat Reports

View All

Industry Insights

View All

Let's Talk

Ready for Guardians You Can Trust?

Meet with us to discuss your threats, vulnerabilities, and challenges and discover how Deepwatch can stand watch over what matters most.