Cyber Threat Intelligence
Deepwatch Labs
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Deepwatch Enhances Capabilities with Open Security Data Architecture
Cyber Threat Intelligence
Curated cybersecurity threat intelligence to keep your organization and SOC ahead of the latest security threats and zero-day vulnerabilities.
Infostealer Circulated Through Facebook, Magnet Goblin Deploys Malware, PLUS 3 Common Post Network Device Tactics and eRAT
CISA Exposes Phobos Affiliates, New Attack Chain Steals NTLM, Plus Terminator and BABYSHARK
Infostealer Circulated Through Facebook, Magnet Goblin Deploys Malware, PLUS 3 Common Post Network Device Tactics and eRAT
CISA Exposes Phobos Affiliates, New Attack Chain Steals NTLM, Plus Terminator and BABYSHARK
Russian Turla Deploys New Arsenal, Attackers Exploit ScreenConnect to Deliver Malware, and Cozy Bear Goes Cloud
An unknown threat actor has successfully exploited the vulnerability in Progress Software's MOVEit Transfer product
Deepwatch detects webshell activity after suspected exploitation of a critical vulnerability in Progress Software’s MOVEit product
Deepwatch investigation found threat actors utilizing an undisclosed vulnerability in Adobe ColdFusion. Learn what happened and what you should do
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.