
Browse Blackpoint’s Threat Intel


From Chrome to Everywhere: The Ever-Expanding CVE-2023-5129
Threat Intel
Unmasking Ransomed.vc: The New Kid on the Cyber Block
Threat Intel
FBI and CISA Team Up to Combat Snatch Ransomware
Threat Intel
When Vulnerabilities Collide: Juniper’s Critical Collision
Threat Intel
Viva Las Vulnerabilities: MGM Hit by ALPHV Ransomware
Threat Intel
Azure HDInsight Battles Against XSS Vulnerabilities
Threat Intel
Top Hacker Tactics You Should Be Aware Of: Understanding Cyberthreats in the Digital Age
Leadership
Cisco ASA SSL VPN Appliances Under Fire
Threat Intel
Unmasking the Acquired Key: Microsoft and Storm-0558’s Tale
Threat Intel
Blackpoint Stops Microsoft Intune Abuse in Under One Minute
Threat Intel
Excel-lent Phishing Campaign with Agent Tesla Variant
Threat Intel
Put on Your Cyber Gloves: BLISTER Loader Resurfaced
Threat Intel
Okta’s Social Engineering Escalations
Threat Intel
MalDoc in PDF: The Word Doc and PDF Team Up
Threat Intel
Qakbot’s Quack Attack Comes to an End
Threat Intel
Proxy Party of Peril: Malware and Proxy Team Up
Threat Intel
China’s High-Stakes Cyber Shenanigans: Cert Theft & DLL Hijacking
Threat Intel
Meet Rhysida: The ‘Helpful’ Cybersecurity Team with a Dark Side
Threat Intel
Midnight Blizzard Mixes Up Microsoft 365
Threat Intel
The SSM Agent’s Secret Identity: Unmasking the RAT Within
Threat Intel
Pebbles Aren’t Alone: The Fruity Find Making Waves in Cybersecurity
Threat Intel
Abusing the Microsoft “search”/”search-ms” URI Protocol
Threat Intel
Nitrogen’s Malvertising Mayhem: When Ads Go Rogue!
Threat Intel
MikroTik Vulnerability Emerges from the Past
Threat Intel
Apple Combats Zero-Day Zero-Click Campaign
Threat Intel
Redis on the Run: P2PInfect Worm Attacks
Threat Intel
Identity Crisis in the Cloud: Storm-0558 and the Forged Access Key
Threat Intel
FIN8’s Latest Remix: Sardonic with Noberus
Threat Intel
WormGPT: The New Bait in Phishing and BEC Attacks
Threat Intel
Exploding Back into the Picture: TeamTNT Makes a Comeback
Threat Intel
SocGholish: Haunting the Digital Realm for Over Five Years
Threat Intel
Zero-Day Fireworks: Microsoft’s July Patch Party
Threat Intel
A Glimpse at Ransomware Roundup: APG Explores the Latest Threat Actors and Variants
Threat Intel
Sign Here, Malware There: Forged Kernel-Mode Driver Signatures
Threat Intel
An Update on the MOVEit Vulnerability
Threat Intel
Blackpoint Command Session 15: Building a Threat-Informed Security Stack that Sells
Leadership
Blackpoint Cyber Detains Qakbot Information-Stealing Malware
Tech Center
A Deep Dive Into the 3CXDesktopApp Security Vulnerability
Threat Intel
2023 Cyberthreats to Watch Out For
Threat Intel
With .one Foot in the Door
Threat Intel
ChileLocker’s Chilling Mistakes
Threat Intel
In the Chaos of Lorenz, APG sORted It Out
Threat Intel
IT Tools, Infostealers, and Account Compromise – Blackpoint’s Threat Operations Year in Review
Leadership
Nation States’ Impact on Cyber Insurance
Leadership
But is MFA Enough? Unpacking Business Email Compromise
Leadership
Unearthing Project Relic
Leadership
Blackpoint Responds to Business Email Compromise
Tech Center
Ratting Out Arechclient2
Threat Intel
Blackpoint Overwatch: Executive Summary of Ratting Out Arechclient2
Threat Intel
Emerging Threat Briefing
Threat Intel
Episode 16: Lessons Learned from Zero-Day Attacks with APG
Leadership
Combatting Industry Myths with MDR Intel
Leadership
Episode 14: New Tactics and Techniques From the Bad Guys
Leadership
Tech Tuesday: Eye Spy – The Dangers of Legal Malware
Threat Intel
It’s Great, Until It’s Not: Four Security Time Bombs
Threat Intel
Blackpoint ReCON 2022 On-Demand
Company
Episode 11: Password Spraying, Email Impersonation, and Disinformation with David Rushmer
Company
5 Reasons You Won’t Want to Miss ReCON 2022
Company
Episode 07: Breaking Down HAFNIUM, Staying Curious, and Advice for Budding Security Professionals
Leadership
Malware on Trial
Threat Intel
Tarrask-ing for Trouble
Threat Intel
Vulnerabilities Uncovered in SonicWall SMA Appliances
Threat Intel
Apache Log4j RCE Vulnerability
Threat Intel
Critical Microsoft Print Spooler Service Vulnerability Exposed
Threat Intel
Zero-Day Exploit Found in Kaseya VSA
Threat Intel
Ransomware attack shuts down critical US pipeline
Threat Intel
Threat Actors Exploit SonicWall Email Security Vulnerabilities
Threat Intel
Significant Increase in Cyber Attacks Targeting Accounting Firms
Threat Intel
HAFNIUM Hackers Attack Microsoft Exchange Servers using Multiple Zero-day Vulnerabilities
Threat Intel
Florida Water Treatment Center Hacked
Threat Intel
SonicWall Hacked Using Zero-day vulnerabilities in its VPN Products
Threat Intel
FBI Warns of Increasing Ragnar Locker Ransomware Attacks
Threat Intel
Password Exposure for Fortinet Devices Vulnerable to CVE-2018-13379
Threat Intel
Critical Vulnerability for SonicWall VPN (CVE-2020-5135)
Threat Intel
Critical Windows “MS-NRPC” Exploit ZeroLogon (CVE-2020-1472)
Threat Intel
Passwords leaked for Enterprise VPN (CVE-2019-11510)
Threat Intel
Critical Microsoft DNS Server Vulnerability (CVE-2020-1350)
Threat Intel
VMware vCenter Server Security Vulnerability (CVE-2020-3952)
Threat Intel
CISA Warns of Nation-State Attacks – Are You Prepared?
Threat Intel
WannaCry Déjà Vu
Threat Intel
Spear Phishing Campaign Stopped by Blackpoint MDR
Threat Intel
Olympic Destroyer Hack: How We Would’ve Stopped It
Threat IntelStay in the Know
They say that knowing is half the battle. Get regular updates on all the latest in cybersecurity including threat intel, new Blackpoint capabilities, upcoming events, and more.