Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Download Volume 3 of A Cyber Architect's Playbook & start planning for a resilient future.
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
DIY Malware Bypasses AV, SAP Flaw Enables Remote Attacks, and CISA Adds New Exploited Vulnerabilities Amid Rising Ransomware Activity
Golden Chickens Unleash New Malware, Scattered Spider Threats Persist, and New Vulnerabilities Added to CISA’s Catalog Amid Rising Ransomware Trends
DIY Malware Bypasses AV, SAP Flaw Enables Remote Attacks, and CISA Adds New Exploited Vulnerabilities Amid Rising Ransomware Activity
Golden Chickens Unleash New Malware, Scattered Spider Threats Persist, and New Vulnerabilities Added to CISA’s Catalog Amid Rising Ransomware Trends
FOG Ransomware Tactics Uncovered, Dual Threats Delivered via Phishing, and New Broadcom, Qualitia, Commvault, and SAP Vulnerabilities Added to CISA’s Catalog
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.