Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Webinar: Finding the Gaps That Matter | CTEM Masterclass
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Cisco ASA - CVE-2025-20333 - CVE-2025-20362 - UAT4356 - Storm-1849 - ArcaneDoor - RayInitiator - LINE VIPER - VPN Web Server - Remote Code Execution - Unauthorized Access Vulnerability - Espionage
From npm Infiltration to Federal Exposure: Shai-Hulud Supply Chain Attack, Ransomware Trends, and Critical Cisco & Google Exploits Highlight Security Gaps
From npm Infiltration to Federal Exposure: Shai-Hulud Supply Chain Attack, Ransomware Trends, and Critical Cisco & Google Exploits Highlight Security Gaps
When Invites Become Threats: iCloud Calendar Lures, Salesforce Exploits, and Ransomware Actors Leverage Human Error and App Integrations.
Cloud Account Takeovers, Emerging Botnets, and Exploited Vulnerabilities: AWS Campaign and NightshadeC2 Mark a Shift in Threat Actor Tactics
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Ready for Guardians You Can Trust?
Meet with us to discuss your threats, vulnerabilities, and challenges and discover how Deepwatch can stand watch over what matters most.