Skip to content
  • Sat. Jun 14th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Vulnerabilities_Exploits

Critical CUPS Vulnerabilities: Remote Code Execution Risk for UNIX-Based Systems

27 September 2024 Threat Analyst

On September 26, 2024, a set of severe vulnerabilities affecting the Common UNIX Printing System (CUPS) was publicly disclosed, prompting immediate concern across the cybersecurity community. These vulnerabilities, particularly CVE-2024-47176,…

Events_Conferences

Upcoming Conference – Hack.lu 2024

27 September 2024 Threat Analyst

Hack.lu 2024 will take place from 22nd to 25th October in Luxembourg, showcasing the latest in cybersecurity innovation and research. Known for its wide range of topics, from malware analysis…

Threat_Actor_Profiles

Peaklight Malware: A Stealthy Memory-Only Threat Leveraging Known Vulnerabilities

25 September 2024 Threat Analyst

In September 2024, Mandiant uncovered Peaklight, a sophisticated memory-only malware, which has been making waves in the cybersecurity community due to its stealth and effectiveness. This malware-as-a-service (MaaS) campaign primarily…

Industry_News Threat_Actor_Profiles

RansomHub Ransomware Surge: A Growing Threat to Critical Infrastructure

24 September 2024 Threat Analyst

In September 2024, U.S. authorities raised alarms over a significant threat that has been quietly gaining momentum this year—RansomHub, a ransomware-as-a-service (RaaS) platform that has been targeting vital sectors across…

Industry_News

CrowdStrike Outage of July 2024: A Detailed Breakdown and Analysis

31 July 2024 Threat Analyst

In **July 2024**, cybersecurity giant **CrowdStrike** faced a widespread **IT outage** that affected **over 8.5 million Windows systems** worldwide. This massive disruption was caused by a faulty update in CrowdStrike’s…

Incident_Reports

FlightAware Data Breach: Years of User Data Exposed Due to Configuration Error

31 July 2024 Threat Analyst

In August 2024, **FlightAware**, a widely-used flight-tracking platform, disclosed a significant data breach. The breach, caused by a **configuration error**, exposed the **personal information** of users for several years. This…

Incident_Reports

Nokia Employee Data Breach: 7,622 Records Exposed in July 2024

31 July 2024 Threat Analyst

In July 2024, Nokia Corporation confirmed a data breach that exposed the personal details of 7,622 employees. This breach was claimed by a threat actor known as 888, who allegedly…

Prevention_Mitigation

RockYou2024: Historic Password Leak Exposes 10 Billion Passwords

31 July 2024 Threat Analyst

In July 2024, the cybersecurity world was shaken by the RockYou2024 breach, the largest recorded password leak in history. Nearly 10 billion passwords were exposed on a hacking forum in…

Incident_Reports

Twilio Authy API Breach: A Vulnerability That Exposed Millions to Potential Phishing Attacks

31 July 2024 Threat Analyst

In July 2024, Twilio, a major communications provider, disclosed a significant breach involving its Authy multi-factor authentication (MFA) service. This incident, attributed to the ShinyHunters hacking group, exploited an unsecured…

Incident_Reports

HealthEquity Data Breach Exposes Protected Health Information of 4.3 Million Individuals

15 July 2024 Threat Analyst

In early July 2024, HealthEquity, a prominent U.S. health savings account (HSA) and healthcare services provider, reported a significant data breach. The breach compromised the protected health information (PHI) of…

Posts pagination

1 2 3 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills