Welcome to ThreatIntelReport.com, a practitioner-focused publication delivering timely, evidence-led threat intelligence you can act on.
We write for security teams, SOC and threat analysts operating in a landscape where adversaries adapt faster than most organisations can patch, detect, and respond. Our aim is simple: reduce ambiguity and help you make better decisions under pressure.
What you will find here
- Threat actor profiles that go beyond naming and shaming. We track motivations, targeting patterns, tradecraft, and operational security, mapping behaviours to the MITRE ATT&CK framework and grounding assessments in reputable sources wherever possible.
- Long-form intelligence reports that prioritise clarity, relevance, and impact. Expect technical depth, defensive takeaways, and forward-looking analysis shaped by what is being exploited, weaponised, or operationalised right now.
- Incident write-ups covering high-impact intrusions, malware campaigns, and major supply-chain or vulnerability-driven events worldwide. Each write-up focuses on the “how” and “why”, extracting lessons learned, detection opportunities, and mitigation strategies that can be applied in real environments.
- Analyst resources including practical guidance, playbooks, and curated references to help sharpen investigative workflows and improve threat-hunting outcomes, whether you are building muscle memory or scaling mature capabilities.
Our mission is to equip defenders with credible, actionable intelligence that improves detection, response, and resilience. If you are here to understand adversary behaviour, prioritise risk, and stay ahead of what comes next, you are in the right place.
Read our privacy policy.
Latest Posts:
Scattered Lapsus$ Hunters recruits women for paid helpdesk vishing
Executive Summary Scattered Lapsus$ Hunters (SLH, also styled SLSH in some reporting) is advertising…
Scattered Spider threat actor profile
Scattered Spider is a financially motivated eCrime collective best known for high-success social eng…
Critical Juniper PTX Junos OS Evolved flaw enables unauthenticated root takeover (CVE-2026-21902)
Incorrect permission assignment exposes an internal anomaly-detection service, enabling remote root …
APT37 “Ruby Jumper” campaign bridges air-gapped networks using USB and a portable Ruby runtime
Zscaler ThreatLabz reports a December 2025 campaign it tracks as Ruby Jumper, attributed with high c…
Cyber Threats to the UK Financial System: Banking, Capital Markets, Asset Management and Central Banking (Transatlantic & Geopolitical Drivers, 2024–2026 Incident Case Studies)
Executive Summary UK financial stability and customer outcomes are increasingly shaped by operationa…
WebDAV Delivery via Windows File Explorer: How .URL and .LNK Shortcuts Stage Malware Outside the Browser
Short title: Deep dive on Explorer-native WebDAV abuse for malware deliveryWebDAV, Windows File Expl…



