One of the most common criticisms Android users have of Apple’s iPhone is that they do not allow any side loading of apps. Mobile apps on iPhone can only be downloaded from Apple’s app store, ensuring Apple has full control over its ecosystem. While this may somewhat change in the future due to European Union […]| IntelFinder
Every now and then in the cyber security industry, there’s a news title that becomes explosive. “The Biggest DDoS in History”, “Massive Data Leak from Company X”, or “Researchers Discover a New Bleeding-Edge Tool in the Dark Web”, garners a lot of attention for a short while, resulting in CISOs and SOC teams scratching their […]| IntelFinder
One of the major tools used by cybersecurity professionals is the WHOIS query. The query enables retrieval of information about a given domain – where it was registered, when it was registered, when it expires, what its name servers are, and more. This information can be crucial for brand protection, law enforcement investigations, and more. […]| IntelFinder
Threat actors are always on the lookout for ways to monetize access to systems. While endpoints and cloud environments have long been favored targets, a new target is starting to trend in the dark web – access to DNS servers. A scroll through various dark web forums reveals multiple offers by threat actors selling access […]| IntelFinder
On March 22nd 2025, cyber security company CloudSEK published an article on their blog claiming that they had come across a post on the dark web where a threat actor was selling data on 6 million user records from Oracle Cloud’s SSO and LDAP. The post was originally published two days earlier, on March 20th, […]| IntelFinder
In the digital landscape, safeguarding your brand’s online presence is paramount and takedown services play a major role in it. By contacting Registrars and web hosting companies that host malicious content, takedown services are an effective instrument of removing such threats from the web. However, Registrars and web hosting companies usually only act on cases […]| IntelFinder
According to Check Point Software, 2024 saw a significant increase in infection attempts by Infostealer logs, up by 58% from the previous year. Infostealers pose a growing threat to organizations across all industries, as leaked employee credentials could provide threat actors with opportunities to cause serious harm, enabling them to illegally access both internal resources […]| IntelFinder
Many organizations face the threat of Phishing. Cybercriminals utilize Phishing attacks to obtain user credentials for whichever service they deem valuable – from internet service providers (the first recorded Phishing attacks targeted AOL users), to financial institutions and online services such as Netflix and Instagram. In order to protect their customers, organizations have no choice […]| IntelFinder
Despite becoming a major threat over two decades ago, Phishing attacks are still a major technique used to steal credentials. Their use by threat actors hasn’t slowed down due to two main factors – they still require a relatively small amount of technical prowess to pull off, and they are still quite effective. Phishing attacks […]| IntelFinder
The cybersecurity space has always had a problem with terminology. For example, Business Email Compromise (BEC Fraud) refers to incidents where threat actors gain access to a company’s Email address and use previous email communications to defraud existing relationships, such as customers or partners. However, in some cases of BEC fraud, threat actors don’t actually […]| IntelFinder
Actionable Intelligence | intelfinder.io
One of the major tools used by cybersecurity professionals is the WHOIS query. The query enables retrieval of information about a given domain – where it was registered, when it was registered, when it expires, what its name servers are, and more. This information can be crucial for brand protection, law enforcement investigations, and more. WHOIS queries can also be performed on IP addresses, revealing the web hosting company that owns the IP address.| IntelFinder