Platform
Solutions
Resources
Company
Blog

March 25 , 2024

5 min read

Introducing RiskFeed

heroImage

RiskFeed scans the deep and dark web for new cyber threats. It tells you which ones actually matter for your business. This helps you focus on the threats that are most relevant and impactful to you.

How we do it?

We built the world's most complete database of threat data by centralizing exploitation observations across hundreds of sources into one source of truth.

how-we-do

Use RiskFeed to track emerging threats and exploit trend activity with the power of AI.

We built the world's most complete database of threat data by centralizing exploitation observations across hundreds of sources into one source of truth.

Ransomware attackers targeted app developers with malicious Office docs.image

Microsoft  has detailed how it recently saw hackers exploiting a dangerous remote code execution vulnerability in the MSHTML aka Trident rendering engine of Internet Explorer.

"Some of the infrastructure that hosted the Objects utilized in the August 2021 attacks abusing  CVE-2021-40444  involved in the delivery of  BazarLoader   and  Trickbot  payloads — activity that overlaps with a group Microsoft tracks as DEV-0193. DEV-0193 activities overlap with actions tracked by Mandiant as  UNC1878," Microsoft notes.

The VBScriptexecutes the PowerShell  script in the same folder. The .ps1 file decodes the encoded .txt file (ibgqbamp.txt) and executes it. In this process, the PowerShell script reads the encoded .txt file and puts it into a variable

Microsoft

Scripts allow you to record and replay your Excel actions on different workbooks and worksheets. If you find yourself doing the same things over and over again

Fortify Your Defence With Managed Detection and Response

RiskFeed evolves into real-time threat prevention technology by using a powerful AI model. This way, you can focus on business-specific threats.

Threat Actors

Malwares

Impacted Industries

Water Industry

Information Industry

Telecommunications

Attack Vectors

Local

Network

Physical

CVE Name

Some of the things you may want to know

We answered questions so you don’t have to ask them.

Ready for action

Stay informed and ready for action with an AI monitoring service that covers you
24x7 and alerts on emerging threats and exploits.

The only AI-enabled Continuous Threat Exposure Management Solution (CTEM)

Stay informed and ready for action with an AI monitoring service that covers you 24x7 and alerts on emerging threats and exploits.

Copyright © 2024. All Rights Reserved. RiskHorizon and the RiskHorizon logo are trademarks of RiskHorizon, Inc.