Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Deepwatch Acquires Dassana
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Russian Adversaries Exploit Device Code Authentication, Earth Preta Uses MAVInject for Stealthy Attacks, Ransomware Trends Shift, and CISA Adds New Exploited Vulnerabilities
Threat Actors Exploit ASP.NET Machine Keys, Credential-Stuffing Attacks Target Mobile Apps, Ransomware Trends Evolve, and CISA Adds New Exploited Vulnerabilities
Russian Adversaries Exploit Device Code Authentication, Earth Preta Uses MAVInject for Stealthy Attacks, Ransomware Trends Shift, and CISA Adds New Exploited Vulnerabilities
Threat Actors Exploit ASP.NET Machine Keys, Credential-Stuffing Attacks Target Mobile Apps, Ransomware Trends Evolve, and CISA Adds New Exploited Vulnerabilities
GitHub Abuse Delivers Lumma Stealer, XE Group Exploits VeraCore for Persistent Access, CISA Flags New Vulnerabilities, and Rising Ransomware and Extortion Trends Persist
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.