Skip to content
  • Sat. Feb 21st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Phishing

Latest Post

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV Payload Ransomware: Early Profile APT33 – Threat Actor Profile BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

EDITOR'S CHOICE

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst
Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst

Peaklight malware deep dive, peaklight, emmenhtal, in-memory malware, lnk, mshta, powershell, bunnycdn, webdav, cryptbot, lumma, shadowladder, hijackloader, threat hunting, incident response, mitre att&ck 1. Executive Summary Peaklight (also tracked as…

Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst

Tags: Payload ransomware, data broker extortion, double extortion, Tor leak site, ESXi ransomware, RECOVERY-xx0001.txt, IOCs, incident response Published: 21 February 2026 (Europe/London) 1. Executive Summary Payload is an emerging ransomware…

Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst

APT33, Elfin, Peach Sandstorm, HOLMIUM, Refined Kitten, Iran, aerospace, energy, petrochemical, spearphishing, password spraying, Outlook Home Page, Ruler, TurnedUp, DropShot, ShapeShift, StoneDrill 1. Executive Summary APT33 is a suspected Iranian…

Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst

CISA has now flagged CVE-2026-1731—a critical, pre-authentication remote code execution flaw in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) as being used in ransomware campaigns, signalling that exploitation…

Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst

Ivanti Endpoint Manager Mobile (EPMM) sits in a uniquely privileged position: it manages device enrollment, policy enforcement, and app/content distribution across entire mobile fleets. When an internet-facing EPMM server is…

Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst

Publish date: 21 February 2026Category: Threat Intelligence / Defense Evasion / Endpoint SecurityTags: EDR, XDR, ransomware, defense evasion, BYOVD, Windows drivers, tamper protection, detection engineering Executive summary “EDR killers” are…

Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst

Last updated: 21 February 2026 (Europe/London) 1. Executive Summary Bring Your Own Vulnerable Driver (BYOVD) is a post-compromise technique where attackers load a legitimately signed (but vulnerable) kernel driver and…

Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst

APT29, also known as Cozy Bear, is a Russian hacker group believed to be affiliated with one or more Russian intelligence agencies. The group has been operating for the Russian…

Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst

1. Executive Summary APT28 is a long-running Russian state-aligned cyber espionage actor widely attributed to the GRU’s 85th Main Special Service Center (GTsSS), military unit 26165, active since at least…

Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst

At-a-glance Attribute Assessment Primary tracking name APT31 (widely used in government and industry reporting) (Department of Justice) Notable aliases Violet Typhoon / ZIRCONIUM (Microsoft), JUDGMENT PANDA (CrowdStrike) (Microsoft Learn) Suspected…

Posts pagination

1 2 … 25
Search
Recent Posts
  • Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
  • Payload Ransomware: Early Profile
  • APT33 – Threat Actor Profile
  • BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
  • Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Archives
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe