Resources
Welcome to our Cyber Hub! Explore the latest security updates, case studies, and upcoming events
Israeli National Cyber Directorate Training
HackersEye Leads Training with Israeli National Cyber Directorate
LOG4J exploit shocks cyber security
Explore how NSO’s Pegasus spyware exploited iOS vulnerabilities through sophisticated tactics, reshaping the cybersecurity landscape by making advanced hacking tools available to private entities.
Iranian Hackers Claim Breach on Intel Israel
Iranian hacking group Pay2Key launches a ransomware attack on Intel Israel, threatening to expose sensitive data from its AI processor chip subsidiary, Habana Labs, unless demands are met.
Tails from the shadow
This article reveals APT41’s cyber operations using Logger.exe to deploy ShadowPad malware through DLL sideloading. Discover how this group evades detection, leverages sophisticated attack methods, and what strategies can mitigate this advanced threat.
MuddyWater’s Cyber Assaults on Israel
Implemented advanced EDR solutions, enforced multi-factor authentication, and conducted comprehensive employee training to protect a mid-sized healthcare provider from ransomware attacks, resulting in zero breaches and enhanced compliance.
CheckMesh: Hidden Threats in Your FW
CheckMesh attack: APTs turning Check Point firewalls into Command & Control nodes. Learn how we uncovered and mitigated this threat.