Skip to content
  • Mon. Aug 25th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

Threat Actor Profile: APT29

21 July 2023 Threat Analyst

APT29, also known as Cozy Bear, is a Russian hacker group believed to be affiliated with one or more Russian intelligence agencies. The group has been operating for the Russian…

Prevention_Mitigation Techniques_Tactics_Procedures Trends_Analysis

Insecure Direct Object References (IDOR): A Deep Dive into the #1 Vulnerability Found by Penetration Testers in 2023

21 July 2023 Threat Analyst

Insecure Direct Object References (IDOR) vulnerabilities have been a consistent thorn in the side of web application security. In 2023, it was identified as the top vulnerability discovered by penetration…

Techniques_Tactics_Procedures Threat_Actor_Profiles Trends_Analysis

Top 10 Vulnerabilities and Misconfigurations Found by Pen Testers in 2023

21 July 2023 Threat Analyst

In the ever-evolving landscape of cybersecurity, it is crucial to stay updated with the latest vulnerabilities and misconfigurations that threat actors exploit. This article provides a detailed overview of the…

Industry_News

Unchecked Privileges: The Risks of Third-Party Windows Installers

21 July 2023 Threat Analyst

In a recent blog post by Mandiant, a cybersecurity firm, they highlighted the potential risks associated with third-party Windows installers. The post emphasizes how threat actors can exploit these installers…

Incident_Reports Industry_News Threat_Actor_Profiles

SmokeLoader Malware: A Deep Dive into UAC-0006’s Polyglot Attack

21 July 2023 Threat Analyst

In the ever-evolving landscape of cyber threats, the UAC-0006 threat actor group has recently resurfaced with a new wave of attacks. This time, they're deploying the SmokeLoader malware through a…

Incident_Reports Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

CERT-UA Unveils Escalation in Cyberattacks: An In-Depth Analysis

21 July 2023 Threat Analyst

In a recent report, the Computer Emergency Response Team of Ukraine (CERT-UA) has highlighted a significant increase in cyberattacks against the country’s civil infrastructure websites, particularly those of government agencies…

Industry_News Techniques_Tactics_Procedures Tools_Resources

MITRE Engenuity Introduces Threat Report ATT&CK Mapper (TRAM)

21 July 2023 Threat Analyst

MITRE Engenuity's Centre for Threat-Informed Defence has developed a new open-source platform, the Threat Report ATT&CK Mapper (TRAM). TRAM is designed to advance research into automating the mapping of cyber…

Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

APT41 Hackers Unleash WyrmSpy and DragonEgg Spyware on Android Users

21 July 2023 Threat Analyst

The notorious APT41 hacking group, known for their extensive cyber-espionage operations, has turned their attention to Android devices, deploying two newly discovered spyware strains, WyrmSpy and DragonEgg. These strains, discovered…

Incident_Reports Industry_News

GitHub warns of Lazarus hackers targeting devs with malicious projects

21 July 2023 Threat Analyst

GitHub is warning of a social engineering campaign targeting the accounts of developers in the blockchain, cryptocurrency, online gambling, and cybersecurity sectors to infect their devices with malware. Source: GitHub…

Industry_News Threat_Actor_Profiles

MOVEit body count closes in on 400 orgs, 20M+ individuals

20 July 2023 Threat Analyst

‘One of the most significant hacks of recent years,’ we’re told The number of victims and costs tied to the MOVEit file transfer hack continues to climb as the fallout…

Posts pagination

1 … 13 14 15 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills