
Threat Actors’ Hottest New Target: Access to DNS Servers
Threat actors are always on the lookout for ways to monetize access to systems. While endpoints and cloud environments have long been favored targets, a
Threat actors are always on the lookout for ways to monetize access to systems. While endpoints and cloud environments have long been favored targets, a
On March 22nd 2025, cyber security company CloudSEK published an article on their blog claiming that they had come across a post on the dark
In the digital landscape, safeguarding your brand’s online presence is paramount and takedown services play a major role in it. By contacting Registrars and web
According to Check Point Software, 2024 saw a significant increase in infection attempts by Infostealer logs, up by 58% from the previous year. Infostealers pose
Many organizations face the threat of Phishing. Cybercriminals utilize Phishing attacks to obtain user credentials for whichever service they deem valuable – from internet service
Despite becoming a major threat over two decades ago, Phishing attacks are still a major technique used to steal credentials. Their use by threat actors
The cybersecurity space has always had a problem with terminology. For example, Business Email Compromise (BEC Fraud) refers to incidents where threat actors gain access
The following article has been posted on the LinkedIn page of our new takedown service, CyberATS. We recommend following CyberATS‘s and IntelFinder‘s LinkedIn pages to
At IntelFinder, we’ve always been at the forefront of delivering actionable threat intelligence to our clients. However, detecting a threat is merely the first step of
It seems that there is one constant in cyber security, the feeling that the situation is dire. For years, anti-fraud and cyber security solutions have
Copyright 2024 Inteller ltd