Refund fraud on the dark web
This report examines underground discourse of “refunding” TTPs, providing an overview of threat actors' most common refunding methods.
Read nowHear how customers are generating the most accurate assessment of vulnerability exploitation probability.
Vulnerability exploitation is the most common attack vector for cybercriminals. To remediate these threats and reduce risk, security teams need to know their vulnerability exposure, the probability of exploitation, and the level of risk posed by each exposure to their organization.
Recent research by IBM revealed that over ⅓ of cyber attacks in 2021 used vulnerability exploitation as the initial means of infiltration. Despite this rapidly accelerating risk, the most common inquiries received by Gartner are “How do I identify the top 100 vulnerabilities in my VA report?” and “How do I prioritize those vulnerabilities that matter most?”
Access end-to-end vulnerability exploit intelligence across the entire CVE lifecycle.
Operationalize Cybersixgill’s cyber threat intelligence to enhance vulnerability assessment, vulnerability management and vulnerability prioritization.
Automate CPE-to-CVE matching with precision
Map to MITRE ATT&CK to quickly understand threats and streamline response
Benjamin Preminger is a Senior Product Manager at Cybersixgill, with a wealth of expertise in cyber threat intelligence, Product Management and Artificial Intelligence. In his current role, Benjamin leads the development of Cybersixgill's investigative portal and vulnerability intelligence solutions. He holds a BA from Yale and an MA from Johns Hopkins SAIS.
Contact our experts to discover which solutions are best for your company