Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Webinar: Why Dark Web Monitoring and Response is Essential
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Brand Impersonation, SaaS Abuse, and $1M Scams: From Salesforce Data Theft to Citrix Exploits, Threat Actors Expand Their Playbook
Fake ChatGPT Apps, Phishing-as-a-Service, and Zero-Days: Modular Backdoors and Exploited Vulnerabilities Push Cyber Threats Further Underground.
Brand Impersonation, SaaS Abuse, and $1M Scams: From Salesforce Data Theft to Citrix Exploits, Threat Actors Expand Their Playbook
Fake ChatGPT Apps, Phishing-as-a-Service, and Zero-Days: Modular Backdoors and Exploited Vulnerabilities Push Cyber Threats Further Underground.
From ClickFix to RomCom: Deceptive Delivery Tactics, WinRAR Exploits, and Ransomware Escalation Fuel New Wave of Targeted Attacks
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Ready for Guardians You Can Trust?
Meet with us to discuss your threats, vulnerabilities, and challenges and discover how Deepwatch can stand watch over what matters most.