×

Download Volume 3 of A Cyber Architect's Playbook & start planning for a resilient future.

Cyber Threat Intelligence

Deepwatch Labs

Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.

Cyber Intel Brief: May 8-14, 2025

DIY Malware Bypasses AV, SAP Flaw Enables Remote Attacks, and CISA Adds New Exploited Vulnerabilities Amid Rising Ransomware Activity

Cyber Intel Brief: May 1-7, 2025

Golden Chickens Unleash New Malware, Scattered Spider Threats Persist, and New Vulnerabilities Added to CISA’s Catalog Amid Rising Ransomware Trends

Cyber Intel Briefs

View All
Cyber Intel Brief: May 8-14, 2025

DIY Malware Bypasses AV, SAP Flaw Enables Remote Attacks, and CISA Adds New Exploited Vulnerabilities Amid Rising Ransomware Activity

Cyber Intel Brief: May 1-7, 2025

Golden Chickens Unleash New Malware, Scattered Spider Threats Persist, and New Vulnerabilities Added to CISA’s Catalog Amid Rising Ransomware Trends

Cyber Intel Brief: April 24-30, 2025

FOG Ransomware Tactics Uncovered, Dual Threats Delivered via Phishing, and New Broadcom, Qualitia, Commvault, and SAP Vulnerabilities Added to CISA’s Catalog

Significant Cyber Events

View All
Operation I like to MOVEit, MOVEit; Active Exploitation of MOVEit Transfer Leads to Data Theft

An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product

Deepwatch Detects Webshell Activity After Suspected Exploitation of a Critical Vulnerability in Progress Software’s MOVEit Transfer Product

Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product

Early Discovery by Deepwatch ATI Finds Adobe ColdFusion Threats

Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do

Customer Awareness Advisory

View All

Cybersecurity Threat Reports

View All

Industry Insights

View All

Let's Talk

Ready to Become Cyber Resilient?

Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.