Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Download Volume 3 of A Cyber Architect's Playbook & start planning for a resilient future.
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
FOG Ransomware Masquerades as Legit Software, Fake CAPTCHAs Fuel Lumma Stealer Infections, and CISA Flags New Microsoft and Apple Vulnerabilities
Threat Actors Evolve Tactics, North Korean Group Targets Developers, and CISA Flags SonicWall Vulnerability
FOG Ransomware Masquerades as Legit Software, Fake CAPTCHAs Fuel Lumma Stealer Infections, and CISA Flags New Microsoft and Apple Vulnerabilities
Threat Actors Evolve Tactics, North Korean Group Targets Developers, and CISA Flags SonicWall Vulnerability
China-Linked Espionage Targets Ivanti, Scattered Spider Adapts with Broader Attacks, and CISA Adds Critical Vulnerabilities Across Multiple Platforms
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.