Skip to content
  • Sun. Jul 13th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Events_Conferences Industry_News Trends_Analysis

Cyber Threat Intelligence Report: UK Further and Higher Education Sectors

24 July 2023 Threat Analyst

The UK Further and Higher Education sectors are increasingly becoming targets for cyber-attacks. These attacks range from opportunistic ransomware operations to more sophisticated Advanced Persistent Threat (APT) groups. This report…

Techniques_Tactics_Procedures Threat_Actor_Profiles

Threat Actor Profile: APT28

24 July 2023 Threat Analyst

APT28, also known as Fancy Bear, Pawn Storm, Strontium, Sofacy, Sednit, and Tsar Team, is a highly sophisticated threat actor that has been active since at least 2007. This group…

Techniques_Tactics_Procedures Threat_Actor_Profiles

Threat Actor Profile: APT31

24 July 2023 Threat Analyst

Introduction APT31 (also known as Zirconium or Judgment Panda) is an Advanced Persistent Threat group whose mission is likely to gather intelligence on behalf of the Chinese government. Similar to…

Incident_Reports Threat_Actor_Profiles Trends_Analysis

Nokia 2023 Threat Intelligence Report

24 July 2023 Threat Analyst

In the recently released “Threat Intelligence Report 2023” by Nokia, the company provides an in-depth analysis of the current cybersecurity landscape, particularly focusing on telecom networks and customer data. The…

Trends_Analysis Vulnerabilities_Exploits

Risks Associated with Managed File Transfer (MFT) Solutions

23 July 2023 Threat Analyst

Managed File Transfer (MFT) solutions are essential tools for businesses to securely transfer sensitive data. However, like any software, they can be vulnerable to exploits if not properly managed and…

Incident_Reports Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

Investigating SMS phishing text messages from scratch – A great share from @BushidoToken

22 July 2023 Threat Analyst

Online and at conferences, people ask me how to get started in threat intel. What I usually offer as advice to budding analysts starting out is to practise analysing things…

Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

Analysis of Evasive Panda APT Group’s Recent Activities

22 July 2023 Threat Analyst

The Evasive Panda Advanced Persistent Threat (APT) group, also known as BRONZE HIGHLAND and Daggerfly, has been active since at least 2012. This Chinese-speaking APT group has been conducting cyberespionage…

Uncategorised

TIR : Weekly Threat Intelligence News Digest

22 July 2023 Threat Analyst

Weekly Digest: Other Cybersecurity News In addition to the articles from Threat Intelligence Report, there have been several other significant developments in the world of cybersecurity over the past week:

Incident_Reports Industry_News Threat_Actor_Profiles Trends_Analysis

Understanding and Mitigating Insider Threats: A Comprehensive Approach

21 July 2023 Threat Analyst

Insider threats are a significant cybersecurity risk that originates from within an organisation. These threats can come from current or former employees, contractors, or anyone else with intimate knowledge of…

Techniques_Tactics_Procedures Threat_Actor_Profiles

Threat Actor Profile: APT30

21 July 2023 Threat Analyst

APT30, also known as APT-C-30, is a China-based cyber espionage group that has been active since at least 2005. The group has targeted multiple industries, including the aerospace, government, defense,…

Posts pagination

1 … 12 13 14 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills