cyble.com Open in urlscan Pro
63.35.51.142  Public Scan

URL: https://cyble.com/
Submission Tags: falconsandbox
Submission: On June 14 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Ransomware Report Q1 - 2023
Download Now
Subscribe To The Cyber Express Newsletter
Home
Products

INTELLIGENCE


Cyble Vision
Secure your business from emerging threats and limit opportunities for your
adversaries.

Cyble Odin (Beta)
Meet the All-Father of Internet Scanning.

AmIBreached
Enables consumers and organizations to Identify, Prioritize and Mitigate darkweb
risks.

Cyble Hawk (LEA, Govt.)
To protect ultra sensitive data and assets.

KNOWLEDGE


The Cyber Express
#1 Trending Cybersecurity News and Magazine
We've just released an update!
Check out the all new dashboard view on Cyble Vision.

Solutions

FUNCTION WISE

hacker
Darkweb & Deepweb

Attack Surface Management

Brand Intelligence

Cyber Threat Intelligence

Vulnerability Management

Takedown & Disruption

INDUSTRY WISE


Financial Services

Retail and CPG

Healthcare & Pharmaceuticals

Technology

Education

ROLE WISE


Information Security
Technical, physical, and administrative measures to mitigate cyber threats.

Corporate Security
It is to ensure the ongoing success and stability of a company.

Marketing Intelligence
To protect the sensitive data and information used in marketing activities from
unauthorized access.
Resources

RESOURCES


Blog
The latest industry news, updates and info.

Case Studies

Research Reports

Whitepapers

SAMA Compliance

Guides and Tips

COMPANY


About us
Learn about our story and our mission statement.

Press
News and writings, press releases, and press resources.

Careers
We're hiring!
We’re always looking for talented people. Join our team!
Unsure about your exposure on the web?
Get an eagle-eye perspective into external threats, Scan your security stack,
Know your supply chain risks and much more.
Access Your Defence

Partners
Partner LoginBecome a Partner
REQUEST A DEMO




THE WORLD'S LEADING SOURCE FOR CUTTING-EDGE THREAT INTELLIGENCE AND RESEARCH



Cyble provides the fastest and most comprehensive coverage across adversaries,
infrastructure, exposure, weaknesses, and targets.

Get Started

Continuous Threat Exposure Management


STAY AHEAD OF CYBER THREATS WITH THE ADVANCED APPROACH TO MANAGING RISK


With a dynamic and interconnected Attack Surface that continuously expands,
maintaining Cybersecurity is a challenge. Traditional security tools offer
limited visibility, making it difficult to assess the true level of security.
Cyble-powered continuous threat exposure management strategy combines a complete
visibility across the Attack Surface with Business Context to accurately assess
the cyber risk and effectively prioritize the mitigation efforts.

Learn more



ACQUIRE COMPREHENSIVE CAPABILITIES AND ACCESS TO EXPERIENCED PROFESSIONALS


Uncover, counter, and impede cyber threats throughout the web


EARLY ALERTS


Access timely and relevant intelligence with AI analysis and expert threat
hunters. Protect your payment card information from theft and safeguard against
compromised identities and credentials. Secure endpoints from infections and
malware, stay informed on trending threats and vulnerabilities, and boost your
cybersecurity resilience.


PROACTIVE DEFENSE


Fortify your brand by proactively identifying and mitigating external threats to
your reputation, domains, executives, and physical locations while disrupting
malicious activities such as Phishing, Fake profiles, and Spoofed domains.
Safeguard proprietary code, Personal Identifiable Information (PII), Protected
Health Information (PHI), intellectual property, and corporate data. Proactively
address brand abuse, impersonation, vulnerabilities, and security
misconfigurations. Stay ahead with comprehensive insights on shadow IT assets,
and leverage IT & OT threat intelligence feeds, reports, and advisories for a
secure and thriving business environment.


PROMPT RESPONSE


Defend your business by disrupting hostile cybercriminal operations, eliminating
malicious content, and leveraging professional threat investigation services.
Engage directly with Threat Actors in the criminal underworld to proactively
address security risks. Rely on our comprehensive Incident Response,
Investigation, and Takedown services to maintain a secure and resilient business
environment.



CYBLE IT! REVOLUTIONIZE YOUR EXPOSURE MANAGEMENT

Cyble empowers governments and enterprises to safeguard their citizens and
infrastructure by providing critical intelligence in a timely manner and
enabling rapid detection, prioritization, and remediation of security threats
through its advanced capabilities for data analysis, expert insights, and
automated processes.

Function wise
Industry wise
Role wise

Darkweb & Deepweb

Attack Surface Management

Brand Intelligence

Cyber Threat Intelligence

Vulnerability Management

Takedown & Disruption

Data Breaches Detection

Dark web monitoring involves scouring the dark web for information related to
your organization, including leaked data, breached credentials, stolen
intellectual property, and other confidential information.

Cybercrime Forum Mentions

Having access to Cybercrime forum mention, enables organizations to understand
the context of cyberattacks, and receive alerts that can be acted upon promptly.

Compromised Cards Detection

Compromised Cards detection assists fraud prevention teams in detecting credit
cards that have been compromised through illegal channels or data breaches, and
in identifying merchants that pose a high risk of fraud before fraudulent
transactions can take place or escalate.

Compromised Endpoints

Cyble provides you the access to compromised endpoints repository related to
your organization, including leaked data, breached credentials,

Incident Response

Get a fast and effective response with the help of top industry experts, backed
by the unique intelligence of Cyble, a globally accessible platform powered by
AI.

Incident Investigation

On-Demand Investigations allow clients to direct projects handled by experienced
analysts, resulting in finished intelligence reports, technical cybersecurity
evaluations, threat assessments, research, and custom analytic projects designed
specifically for the organization's needs.

Application Security Scanning

Application Security Scanners are automated tools that scan web applications
from the exterior to detect security vulnerabilities such as Cross-site
scripting, SQL Injection, Command Injection, Path Traversal, and insecure server
configurations.

Code Repository Analysis

Cyble helps you identify leaks of source code across open-source and public
repositories such as GitHub, ensuring that your application code and crucial
data remains secure and out of the hands of unauthorized individuals.

Cloud Storage Analysis

Cyble assists you in identifying instances of data leakage or assets that have
been publicly exposed in various cloud storage solutions.

File Hashes Detection

Our detection approach utilizes a blacklist of harmful file hashes. We analyze
network traffic, evaluate all connections, and calculate the MD5, SHA1, and
SHA256 hash for every new file identified in the transfer of a connection.

Assets Intelligence

Cyble Asset Intelligence conducts scans on networks to identify new, current and
past security vulnerabilities that can take advantage of faults in software,
hardware, devices, and network infrastructure.

IP Risk Scoring

The IP Risk Score generated by Cyble gives an indication of an IP address being
linked to harmful activity, based on intelligence gathered from various IP
threat sources.

New Ports Discovery

Cyble Asset Intelligence is capable of discovering new ports on a network, which
are entry points for data transmission between devices.

SSL Expiry Alerts

Cyble Asset Intelligence helps organizations ensure that their websites remain
secure and protected against cyber threats by monitoring the expiration status
of Secure Sockets Layer (SSL).

Domain Expiry Alerts

Cyble Asset Intelligence helps organizations ensure the continuity of their
online presence and prevent any potential negative impact on their business by
tracking the expiration date of domain registrations.

Fake Mobile Apps Detection

Cyble protects and preserves your brand's value by detecting, analyzing, and
relentlessly pursuing the removal of fake mobile apps that harm your
organization.

Brand Mentions

Cyble keeps track of all discussions and mentions regarding your company or
product on all relevant channels, including the web and social media with
real-time alerts.

Brand Impersonation

Cybercriminals often create fraudulent accounts using your brand's digital
assets, Manually discovering these fakes is time-consuming. Our service can
quickly locate them and get them removed for you.

Suspicious Domains

Cyble Suspicious Domain tool allows for the scanning of a website or domain for
potential threats or suspicious activity.

Subdomain Discovery

We integrates both passive and active discovery techniques to aid in the
investigation of the subdomains of your target domain for all types of security
testing initiatives.

Phishing Intelligence

Cyble's Phishing Intelligence gives security teams the ability to identify and
counter phishing campaigns, including cross-platform attacks, wherever your
business operates.

Website Watermarking

Our Website Watermarking enables the monitoring of website defacement. Website
defacement is a type of attack that alters the visual appearance of a website or
web page.

Website Monitoring

Website monitoring allows you to stay informed of any updates or modifications
to the content of your website. With this tool, you can be immediately alerted
to any changes, ensuring that your website remains up-to-date and secure.

Threat Library

Cyble offers an organized and searchable platform for structured and
unstructured security information, providing you with an indexed location as
Threat Library.

Botnet Detection

Our botnet detection tools are designed to quickly detect abnormal patterns and
behaviours in network traffic, helping to prevent advanced botnet attacks.

Malware & Ransomware Intelligence

Track malware, adversaries, and tactics, techniques, and procedures (TTPs) used
to breach, escalate, steal data, and hold your organization for ransom, with
speed and efficiency.

Product Vulnerabilities

Cyble can quickly and accurately identify new and existing software
vulnerabilities. This helps organizations stay ahead of potential security
threats and minimize the risk of cyberattacks.

Asset Vulnerabilities

By scanning for and tracking asset vulnerabilities, Cyble Asset Intelligence
helps organizations stay ahead of potential security threats and take action to
protect their assets.

Adversary Disruption

Cyble focuses on disrupting adversarial activities, including cyberattacks and
data breaches. Cyble will help you to detect and disrupt adversarial activities,
minimize the risk of cyberattacks, and secure their networks.

Social Media Takedown

Social Media Takedown, which involves removing or suppressing harmful or
unwanted content from social media platforms. This can include removing
malicious or fake accounts, false information, and others.

Threat Actor Engagement

Take a proactive approach by working with a global team of experts in the dark
web, threat hunters, and cybersecurity professionals to gain access to the
specialized intelligence and information you require from areas that are
otherwise inaccessible.

Financial Services

Retail and CPG

Healthcare & Pharmaceuticals

Technology

Education

Compromised Cards Detection

Compromised Cards detection assists fraud prevention teams in detecting credit
cards that have been compromised through illegal channels or data breaches, and
in identifying merchants that pose a high risk of fraud before fraudulent
transactions can take place or escalate.

Phishing Intelligence

Cyble's Phishing Intelligence gives security teams the ability to identify and
counter phishing campaigns, including cross-platform attacks, wherever your
business operates.

Fake Mobile Apps Detection

Cyble protects and preserves your brand's value by detecting, analyzing, and
relentlessly pursuing the removal of fake mobile apps that harm your
organization.

Suspicious Domains

Cyble Suspicious Domain tool allows for the scanning of a website or domain for
potential threats or suspicious activity.

Compromised Endpoints

Cyble provides you the access to compromised endpoints repository related to
your organization, including leaked data, breached credentials,


Fake Mobile Apps Detection

Cyble protects and preserves your brand's value by detecting, analyzing, and
relentlessly pursuing the removal of fake mobile apps that harm your
organization.

Brand Mentions

Cyble keeps track of all discussions and mentions regarding your company or
product on all relevant channels, including the web and social media with
real-time alerts.

Brand Impersonation

Cybercriminals often create fraudulent accounts using your brand's digital
assets, Manually discovering these fakes is time-consuming. Our service can
quickly locate them and get them removed for you.

Suspicious Domains

Cyble Suspicious Domain tool allows for the scanning of a website or domain for
potential threats or suspicious activity.

Website Watermarking

Our Website Watermarking enables the monitoring of website defacement. Website
defacement is a type of attack that alters the visual appearance of a website or
web page.

Website Monitoring

Website monitoring allows you to stay informed of any updates or modifications
to the content of your website. With this tool, you can be immediately alerted
to any changes, ensuring that your website remains up-to-date and secure.

Data Breaches Detection

Dark web monitoring involves scouring the dark web for information related to
your organization, including leaked data, breached credentials, stolen
intellectual property, and other confidential information.

Cybercrime Forum Mentions

Having access to Cybercrime forum mention, enables organizations to understand
the context of cyberattacks, and receive alerts that can be acted upon promptly.

Incident Response

Get a fast and effective response with the help of top industry experts, backed
by the unique intelligence of Cyble, a globally accessible platform powered by
AI.

Incident Investigation

On-Demand Investigations allow clients to direct projects handled by experienced
analysts, resulting in finished intelligence reports, technical cybersecurity
evaluations, threat assessments, research, and custom analytic projects designed
specifically for the organization's needs.

Assets Intelligence

Cyble Asset Intelligence conducts scans on networks to identify new, current and
past security vulnerabilities that can take advantage of faults in software,
hardware, devices, and network infrastructure.

IP Risk Scoring

The IP Risk Score generated by Cyble gives an indication of an IP address being
linked to harmful activity, based on intelligence gathered from various IP
threat sources.

New Ports Discovery

Cyble Asset Intelligence is capable of discovering new ports on a network, which
are entry points for data transmission between devices.

SSL Expiry Alerts

Cyble Asset Intelligence helps organizations ensure that their websites remain
secure and protected against cyber threats by monitoring the expiration status
of Secure Sockets Layer (SSL).

Domain Expiry Alerts

Cyble Asset Intelligence helps organizations ensure the continuity of their
online presence and prevent any potential negative impact on their business by
tracking the expiration date of domain registrations.

Incident Response

Get a fast and effective response with the help of top industry experts, backed
by the unique intelligence of Cyble, a globally accessible platform powered by
AI.

Incident Investigation

On-Demand Investigations allow clients to direct projects handled by experienced
analysts, resulting in finished intelligence reports, technical cybersecurity
evaluations, threat assessments, research, and custom analytic projects designed
specifically for the organization's needs.

Data Breaches Detection

Dark web monitoring involves scouring the dark web for information related to
your organization, including leaked data, breached credentials, stolen
intellectual property, and other confidential information.

Information Security

Corporate Security

Marketing Intelligence

Data Breaches Detection

Dark web monitoring involves scouring the dark web for information related to
your organization, including leaked data, breached credentials, stolen
intellectual property, and other confidential information.

Cybercrime Forum Mentions

Having access to Cybercrime forum mention, enables organizations to understand
the context of cyberattacks, and receive alerts that can be acted upon promptly.

Assets Intelligence

Cyble Asset Intelligence conducts scans on networks to identify new, current and
past security vulnerabilities that can take advantage of faults in software,
hardware, devices, and network infrastructure.

IP Risk Scoring

The IP Risk Score generated by Cyble gives an indication of an IP address being
linked to harmful activity, based on intelligence gathered from various IP
threat sources.

New Ports Discovery

Cyble Asset Intelligence is capable of discovering new ports on a network, which
are entry points for data transmission between devices.

SSL Expiry Alerts

Cyble Asset Intelligence helps organizations ensure that their websites remain
secure and protected against cyber threats by monitoring the expiration status
of Secure Sockets Layer (SSL).

Domain Expiry Alerts

Cyble Asset Intelligence helps organizations ensure the continuity of their
online presence and prevent any potential negative impact on their business by
tracking the expiration date of domain registrations.

Fake Mobile Apps Detection

Cyble protects and preserves your brand's value by detecting, analyzing, and
relentlessly pursuing the removal of fake mobile apps that harm your
organization.

Suspicious Domains

Cyble Suspicious Domain tool allows for the scanning of a website or domain for
potential threats or suspicious activity.

Website Watermarking

Our Website Watermarking enables the monitoring of website defacement. Website
defacement is a type of attack that alters the visual appearance of a website or
web page.

Website Monitoring

Website monitoring allows you to stay informed of any updates or modifications
to the content of your website. With this tool, you can be immediately alerted
to any changes, ensuring that your website remains up-to-date and secure.

Fake Mobile Apps Detection

Cyble protects and preserves your brand's value by detecting, analyzing, and
relentlessly pursuing the removal of fake mobile apps that harm your
organization.

Brand Mentions

Cyble keeps track of all discussions and mentions regarding your company or
product on all relevant channels, including the web and social media with
real-time alerts.

Brand Impersonation

Cybercriminals often create fraudulent accounts using your brand's digital
assets, Manually discovering these fakes is time-consuming. Our service can
quickly locate them and get them removed for you.

Suspicious Domains

Cyble Suspicious Domain tool allows for the scanning of a website or domain for
potential threats or suspicious activity.

Website Watermarking

Our Website Watermarking enables the monitoring of website defacement. Website
defacement is a type of attack that alters the visual appearance of a website or
web page.

Website Monitoring

Website monitoring allows you to stay informed of any updates or modifications
to the content of your website. With this tool, you can be immediately alerted
to any changes, ensuring that your website remains up-to-date and secure.


PROACTIVELY TACKLE AND MITIGATE YOUR CYBER THREATS

Cyble Vision empowers you to manage your cyber exposure across all assets,
anywhere, giving you the insights to better comprehend your cyber risks and make
informed decisions to reduce them. It assesses the level of development of your
basic security processes, including the security team's ability to detect
critical weaknesses and their efficiency in resolving issues to minimize risk.


Get Access Now



DON’T JUST TAKE OUR WORD FOR IT


Hear from some of our amazing customers who are building faster.
"Cyble Vision took very little time to give us a comprehensive insight into
where we stand from a vulnerability perspective. We received some key insights
into how we could address these concerns as well as detailed advisories on
current and emerging threats."
CTO
Tech Company
"Adding a CISO perspective here, this is a great product to be able to pre-empt
any security incidents as well as refine internal best practices to plug any
vulnerabilities from an internal/organisational standpoint. Would highly
recommend to firms with a considerable digital footprint."
CISO
FinTech Company
"From a compliance and risk management standpoint, this is a fantastic tool to
have. Our team was able to understand how to use and navigate the various tabs
in no time and was effectively able to understand our vulnerability assessment
score."
CMO
Manufacturing Company
"Portal is ease to use and desk board is having all kind of information which
are required to take corrective action to avoid any kind of security incident."
CIO
Tech Company
"We found Cyble Vision to be extremely intuitive and easy to use. The dashboard
provides an extremely comprehensive overview, and the portal is easy to navigate
as well."
CISO
Manufacturing Company
"The integration of Cyble’s Vision product was seamless into our native systems.
In no time at all, the product had mapped out our areas of risk across our
operations and recommended security solutions to address them"
CTO
FinTech company


EXPERIENCE CYBLE IT!

The results of our comprehensive research indicated Cyble as the best option.


REQUEST A DEMO
Display Top Blog Posts


CRIL RESEARCH


THREAT ACTOR TARGETS RUSSIAN GAMING COMMUNITY WITH WANNACRY-IMITATOR



CRIL analyzes WannaCry-Imitator Ransomware, a phishing gaming site targeting the
Russian Gaming community



13 June 2023


OVER 45 THOUSAND USERS FELL VICTIM TO MALICIOUS PYPI PACKAGES



Through the analysis of more than 160 malicious Python packages, CRIL reveals
insights into the threat landscape associated with Python packages.



9 June 2023


UNMASKING THE DARKRACE RANSOMWARE GANG



Cyble analyzes Darkrace, a new ransomware variant that shares similar
characteristics to LockBit Ransomware.



8 June 2023


ANONYMOUS SUDAN LAUNCHES FRESH WAVE OF DDOS ATTACKS ON AMERICAN ORGANIZATIONS
INCLUDING MICROSOFT



Cyble analyzes recent hacktivism claims by Anonymous Sudan impacting US entities
including Microsoft Corporation.



7 June 2023


 LOCKBIT 2.0 RANSOMWARE RESURFACES



Cyble analyzes LockBit Ransomware, which is distributed via malicious documents,
specifically targeting users in Korea.



6 June 2023


HELLOTEACHER: NEW ANDROID MALWARE TARGETING BANKING USERS IN VIETNAM



Cyble analyzes a new malware “HelloTeacher” masquerading as popular messaging
app to target banking users from Vietnam and steals sensitive data.



5 June 2023


EVASIVE NOESCAPE RANSOMWARE USES REFLECTIVE DLL INJECTION



Cyble Research and Intelligence Labs analyzes the NoEscape
Ransomware-as-a-Service platform and explains how it targets VMware ESXi
servers.



4 June 2023


MOVEIT TRANSFER VULNERABILITY ACTIVELY EXPLOITED



Cyble analyzes MOVEit Transfer vulnerability and observes active exploitation in
the Cyble Global Intelligence Sensors (CGSI).



2 June 2023


‘NOESCAPE’ RANSOMWARE-AS-A-SERVICE (RAAS)



CRIL analyzes the newly advertised ‘NoEscape’ Ransomware-as-a-Service (RaaS)
program that claims to facilitate sophisticated extortion operations using an
advanced, indigenously developed ransomware strain.



1 June 2023


SHARPPANDA APT CAMPAIGN EXPANDS ITS ARSENAL TARGETING G20 NATIONS



Cyble analyzes SharpPanda, a highly sophisticated APT group utilizing
spear-phishing tactics to launch cyberattacks on G20 Nation officials.



1 June 2023


EVOLVING THREAT LANDSCAPE OF HACKTIVISM IN COLOMBIA



CRIL investigates the evolving threat landscape of hacktivism leading to
cyberattacks on Colombian Critical Infrastructure and Zero-day Sales by
Hacktivists.



31 May 2023


BL00DY RANSOMWARE TARGETS INDIAN UNIVERSITY: ACTIVELY EXPLOITING PAPERCUT
VULNERABILITY



CRIL analyzes Bl00dy Ransomware’s recent targeting of an Indian University via
exploitation of the PaperCut vulnerability.



30 May 2023


PIXBANKBOT: NEW ATS-BASED MALWARE POSES THREAT TO THE BRAZILIAN BANKING SECTOR



Cyble analyzes PixBankBot, a new ATS-based malware that targets Brazilian banks
through the popular Pix instant payment platform.



30 May 2023


INVICTA STEALER SPREADING THROUGH PHONY GODADDY REFUND INVOICES



Cyble Research & Intelligence Labs analyzes Invicta, a new stealer that spreads
via fake GoDaddy Refund invoices to infect users.



25 May 2023


OBSIDIAN ORB RANSOMWARE DEMANDS GIFT CARDS AS PAYMENT



Cyble Research & Intelligence Labs analyzes Obsidian ORB, a ransomware hybrid
that demands ransom payments in the form of gift cards.



25 May 2023


NOTABLE DDOS ATTACK TOOLS AND SERVICES SUPPORTING HACKTIVIST OPERATIONS IN 2023



Cyble Research & Intelligence Labs analyzes the growing use of DDoS attacks by
Hacktivist groups across the world.



24 May 2023


NEW MDBOTNET UNLEASHES DDOS ATTACKS



Cyble Research & Intelligence Labs analyzes MDBotnet, a malware variant of
Russian origin, carrying out DDoS-as-a-Service attacks.



23 May 2023


NEW RANSOMWARE WAVE ENGULFS OVER 200 CORPORATE VICTIMS



CRIL analyzes multiple new Ransomware families that have affected over 200
firms, spearheaded by Rhysida, 8Base, and MalasLocker ransomware.



23 May 2023


CAPCUT USERS UNDER FIRE



CRIL has uncovered a phishing campaign that targets unsuspecting CapCut users,
aiming to steal their sensitive information.



19 May 2023


ANDORYUBOT’S DDOS RAMPAGE



CRIL analyzes AndoryuBot, a new botnet delivered by exploiting a vulnerability
in Ruckus products to carry out DDOS attacks.



17 May 2023

© 2023 Cyble Inc. All Rights Reserved.

QUICK LINKS

HomeAbout usBlogPressBecome a partnerCareersResponsible Disclosure

PRODUCTS

Cyble VisionAmIBreachedBlogCyble Hawk (LEA, Govt.)Cyble Odin(beta)The Cyber
Express

PRIVACY POLICY

Cyble VisionAmIBreached

×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences