Q4 - 2022 Ransomware Reports
The report reveals new extortion techniques, the unconventional programming language used by Ransomware groups, and much more
Download Now
Protect your organization against External Threats
Gain Visibility, Actionable Intelligence and Remediation Against External Exposure and Attack Surface Exposure
Request Demo
Previous
Next
Cyble-Vultur-Banking-Trojan-App
All

The Vultur malware is delivered as an add-on payload via a fake app called 2FA Authenticator, which over 10,000 people have downloaded.

Read More →
Cyble-US-Army-Under-Attack
All

Cyble Research Lab identified a pro-Russian Threat Actor launching a campaign against the US Army and Defense Industrial Base companies.

Read More →
Cyble-Ongoing-Cyber-Warfare-Russia-Ukraine-Conflict
All

Cyble Research Labs analyzes significant acts of cyberwarfare that have occurred so far in the Russia-Ukraine Conflict.

Read More →
Cyble-Jester-Stealer-Blog
All

Cyble Research Labs have been actively monitoring various stealers, and recently we came across a malware sample which turned out to be Jester Stealer. Jester …

Read More →
Cyble Co-Founders Beenu Arora and Manish Chachada
Annoucement

After a US $10M Series A Round led by Blackbird Ventures, with participation from Spider Capital, January Capital, Cendana Capital, and VentureSouq Cyble started out …

Read More →
Cyble-Blog-Threat-To-US
All

In August 2020, the US Senate Intelligence Committee released a nearly one-thousand-page report documenting the Russian Government’s interference in the 2016 presidential election. The report conclusions leaned …

Read More →
Cyble-Analysis-Sharkbot-Banking-Trojan
Banking Trojan

Cyble Research Labs analyses the latest version of SharkBot malware, which has resurfaced with sophisticated new abilities to target Android banking users.

Read More →
Cyble-Analysis-Sugar-Ransomware-Conducting-Low-Profile-Attacks
Ransomware

Cyble Research Labs takes a look at the Sugar Ransomware group, a new Threat Actor carrying out low profile attacks to avoid getting on Law Enforcement Agencies’ radar.

Read More →
Cyble-Analysis-ICS-Attack-Vector-Serial-to-Ethernet-Devices
Vulnerability

Cyble Research Lab’s Analysis on how critical vulnerabilities in Serial-to-Ethernet devices can lead to attacks or compromises on critical national Infrastructure and ICS.

Read More →
Cyble-Research-Threat-Intelligence-Darkweb
Scroll to Top