Skip to content
  • Mon. Jun 16th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Trends_Analysis Vulnerabilities_Exploits

Active Exploitation of Multiple Adobe ColdFusion Vulnerabilities

17 July 2023 Threat Analyst

Rapid7 managed services teams have observed exploitation of Adobe ColdFusion in multiple customer environments. The attacks our team has responded to thus far appear to be chaining CVE-2023-29298 , a…

Techniques_Tactics_Procedures

A technical analysis of the Quasar-forked RAT called VoidRAT

17 July 2023 Threat Analyst

https://resources.securityscorecard.com/research/technical-analysis-of-the-quasar-forked-rat-called-void-rat Source: A technical analysis of the Quasar-forked RAT called VoidRAT / SecurityScoreCard

Techniques_Tactics_Procedures Threat_Actor_Profiles

Black Basta Overview

17 July 2023 Threat Analyst

Black Basta is a Russian-speaking group that was first spotted in early 2022. It is known for its double extortion attack, where it not only executes ransomware but also exfiltrates…

Industry_News Trends_Analysis

ISC China Report Summary

13 July 2023 Threat Analyst

Original Document: https://isc.independent.gov.uk/wp-content/uploads/2023/07/ISC-China.pdf The “China” report by the Intelligence and Security Committee of Parliament provides an in-depth analysis of the perceived threats and challenges posed by China to the UK.…

Techniques_Tactics_Procedures Threat_Actor_Profiles

SmokeLoader malware

17 June 2023 Threat Analyst

SmokeLoader, also known as Dofoil, is a modular bot used primarily to download other malware onto a compromised system. It has been in operation since at least 2011 and has…

Industry_News Trends_Analysis

ISC Russia Report Summary

1 January 2023 Threat Analyst

https://isc.independent.gov.uk/wp-content/uploads/2021/03/CCS207_CCS0221966010-001_Russia-Report-v02-Web_Accessible.pdf The “Russia” report by the Intelligence and Security Committee of Parliament provides an in-depth analysis of the perceived threats and challenges posed by Russia to the UK. Here are…

Industry_News Trends_Analysis

2022 Global Threat Intelligence Report by NTT Security

1 January 2023 Threat Analyst

https://www.security.ntt/pdf/2022-global-threat-intelligence-report-v8.pdf The 2022 Global Threat Intelligence Report by NTT Security Holdings highlights several key trends and events in the cybersecurity landscape:

Incident_Reports

Brenntag Ransomware Attack

17 July 2022 Threat Analyst

In April, Brenntag, a global chemical distribution company, was hit by a ransomware attack. The DarkSide hacker group claimed responsibility, extracting a significant ransom payment. The attack resulted in a…

Incident_Reports

Quanta Ransomware Attack

17 July 2022 Threat Analyst

In April, Quanta, a Taiwan-based manufacturer of Apple products, fell victim to a ransomware attack. The REvil group claimed responsibility, threatening to release sensitive data if a ransom was not…

Incident_Reports

CNA Financial Ransomware Attack

17 July 2022 Threat Analyst

In March, CNA Financial, one of the largest insurance providers in the U.S., was disrupted by a ransomware attack. The company had to disconnect systems and services for several days…

Posts pagination

1 … 16 17 18 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills