Skip to content
  • Mon. Jun 16th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Threat_Actor_Profiles

FIN8 Cybercrime Group

18 July 2023 Threat Analyst

In the ever-evolving landscape of cyber threats, the financially motivated cybercrime group known as FIN8 continues to make waves. Known for their sporadic yet impactful attacks, FIN8 has been active…

Industry_News Threat_Actor_Profiles

Exploring TA453’s Foray into LNKs and Mac Malware – Proofpoint Report

18 July 2023 Threat Analyst

"Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware" published by Proofpoint discusses the evolving tactics of TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and…

Incident_Reports Industry_News

Inside Job: IT Security Analyst Convicted for Exploiting Ransomware Attack on Oxford Biomedica

18 July 2023 Threat Analyst

Ashley Liles, a 28-year-old former IT security analyst from Letchworth Garden City in Hertfordshire, has been convicted of blackmail and unauthorized access to a computer with intent to commit other…

Industry_News

Unmasking AVrecon: The Stealthy Malware Infiltrating Global Routers – Lumen Report

18 July 2023 Threat Analyst

Lumen Technologies, formerly known as CenturyLink, is a global technology company that provides a wide range of services, including communications, network services, security, cloud solutions, voice, and managed services. The…

Tools_Resources Trends_Analysis

Overcoming the Top Ten Challenges in Open Source Intelligence (OSINT): A Comprehensive Introduction

18 July 2023 Threat Analyst

Open Source Intelligence (OSINT) has become an indispensable tool in the digital age, providing a wealth of information from publicly available sources. It is used extensively in various fields, from…

Incident_Reports Industry_News

JumpCloud Security Breach

18 July 2023 Threat Analyst

JumpCloud, a US-based enterprise software firm known for its cloud directory platform, recently disclosed a security breach that was part of a highly targeted operation aimed at a select group…

Incident_Reports Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

TeamTNT’s Cloud Credential Stealing Campaign

18 July 2023 Threat Analyst

In the ever-evolving landscape of cybersecurity, threat actors continue to innovate and adapt their methods to exploit new technologies and platforms. One such group, known as TeamTNT, has been actively…

Incident_Reports Industry_News

In-Depth Analysis of Storm-0558 Techniques for Unauthorized Email Access

18 July 2023 Threat Analyst

This blog post is based on the detailed analysis provided by Microsoft Security Blog on the techniques used by the threat actor tracked as Storm-0558 for unauthorized email access. Executive…

Vulnerabilities_Exploits

Act now! In-the-wild Zimbra vulnerability needs a workaround

18 July 2023 Threat Analyst

Security experts are warning Zimbra users that a vulnerability for which there is no patch is being actively exploited in the wild. In a security update about the vulnerability, the…

Incident_Reports Industry_News Vulnerabilities_Exploits

Hackers exploiting critical WordPress WooCommerce Payments bug

18 July 2023 Threat Analyst

Hackers are conducting widespread exploitation of a critical WooCommerce Payments plugin to gain the privileges of any users, including administrators, on vulnerable WordPress installation. Source: https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-wordpress-woocommerce-payments-bug/

Posts pagination

1 … 15 16 17 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills