Skip to content
  • Sun. Jun 15th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Incident_Reports

Australia Channel 9 News Ransomware Attack

17 July 2022 Threat Analyst

In March, Channel 9 News, a major broadcaster in Australia, fell victim to a ransomware attack that significantly disrupted their ability to broadcast. This cyber attack demonstrated the potential of…

Incident_Reports

Florida Water Supply Hack

17 July 2022 Threat Analyst

In February, an unknown attacker attempted to poison the Oldsmar city water supply in Florida by manipulating the sodium hydroxide levels through a remote access system. The attacker gained unauthorized…

Incident_Reports

Accellion Supply Chain Attack

17 July 2022 Threat Analyst

In January, a software company named Accellion fell victim to a sophisticated supply chain attack. This cyber attack had a broad impact as it affected numerous organizations across various sectors…

Incident_Reports Techniques_Tactics_Procedures

Microsoft Exchange Vulnerabilities

17 July 2022 Threat Analyst

In the period from January to March, Microsoft Exchange Server software suffered from a series of significant data breaches caused by the exploitation of four vulnerabilities. These vulnerabilities were primarily…

Incident_Reports

Colonial Pipeline Ransomware Attack of 2021: Disrupting Critical Infrastructure

17 July 2022 Threat Analyst

“The Ripple Effect of the Colonial Pipeline Attack: A Deep Dive into Ransomware Tactics” In May 2021, the Colonial Pipeline, a significant artery for the U.S. fuel supply, fell victim…

Incident_Reports

Twitter Bitcoin Scam Hack of 2020: Targeting High-Profile Accounts

17 July 2021 Threat Analyst

In July 2020, a significant cybersecurity incident affected Twitter, one of the world’s largest social media platforms, resulting in a widespread Bitcoin scam. The attack targeted high-profile accounts and raised…

Incident_Reports

SolarWinds Supply Chain Attack of 2020: A Massive Espionage Campaign

17 July 2021 Threat Analyst

In 2020, a highly sophisticated cyberattack targeting SolarWinds, a prominent IT management software provider, was discovered, leading to a significant supply chain breach. This attack, attributed to a nation-state actor,…

Threat_Actor_Profiles

Magecart Attacks: Web Skimming Threatens E-commerce Security

17 July 2021 Threat Analyst

In 2019, a series of cyberattacks known as Magecart attacks targeted various e-commerce websites, compromising customer payment card information. These attacks highlighted the risk of web skimming and the need…

Incident_Reports

WhatsApp Security Vulnerability Exploited by NSO Group in 2019: Targeting Journalists and Activists

17 July 2021 Threat Analyst

In 2019, WhatsApp, one of the world’s most popular messaging platforms, discovered a security vulnerability that was exploited by the NSO Group, an Israeli surveillance firm. The incident raised concerns…

Incident_Reports

Capital One Data Breach of 2019: Exploiting Misconfigured Cloud Infrastructure

17 July 2021 Threat Analyst

In 2019, Capital One, one of the largest banks in the United States, experienced a significant data breach that exposed the personal information of millions of customers. The breach highlighted…

Posts pagination

1 … 17 18 19 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills