Skip to content
  • Sat. Feb 21st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Phishing

Latest Post

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV Payload Ransomware: Early Profile APT33 – Threat Actor Profile BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

EDITOR'S CHOICE

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst
Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst
Threat_Actor_Profiles

Threat Actor Profile: Cl0p (CL0P) — Extortion-led Mass Compromise

20 February 2026 Threat Analyst

1. Executive Summary Cl0p (often written “CL0P”) is a financially motivated extortion operation best known for high-scale data theft campaigns that disproportionately impact organisations running internet-facing Managed File Transfer (MFT)…

Threat_Actor_Profiles

Threat Actor Profile: LAPSUS$ (a.k.a. Microsoft “DEV-0537” / “Strawberry Tempest”)

20 February 2026 Threat Analyst

1. Executive Summary LAPSUS$ is an extortion-focused cybercriminal collective best known for high-tempo intrusions against large enterprises and service providers, frequently leveraging social engineering and identity compromise rather than exploiting…

Vulnerabilities_Exploits

UNC6201 Targets Dell RecoverPoint (CVE-2026-22769): Evolving Backdoors and Novel VMware Pivot Techniques

19 February 2026 Threat Analyst

Mandiant and Google Threat Intelligence Group (GTIG) have released critical findings regarding UNC6201, a suspected PRC-nexus threat cluster. This group has been actively exploiting a Dell RecoverPoint for Virtual Machines…

Vulnerabilities_Exploits

CVE-2026-20841 — Windows Notepad (Store app) Markdown Link Handling Leads to Command Injection / Code Execution

16 February 2026 Threat Analyst

1. Executive Summary CVE-2026-20841 is a high-severity command injection flaw in the modern Windows Notepad (Microsoft Store) application that can result in arbitrary code execution in the context of the…

Vulnerabilities_Exploits

Microsoft February 2026 Patch Tuesday — key takeaways

13 February 2026 Threat Analyst

Microsoft’s February 2026 Patch Tuesday shipped fixes for 58 vulnerabilities, including six zero-days confirmed as actively exploited and three publicly disclosed issues. Microsoft also fixed five “Critical” flaws in this…

Articles Threat_Actor_Profiles

Salesforce “Connected Apps” Supply-Chain Campaign (UNC6040 / UNC6395) — ShinyHunters & Scattered Spider Overlap

9 February 2026 Threat Analyst

1. Executive Summary A widespread data-theft and extortion campaign has targeted organisations’ Salesforce environments by abusing trusted third-party integrations and malicious OAuth “Connected Apps”—rather than exploiting a core Salesforce software…

Incident_Reports

Notepad++ Update Channel Supply-Chain Compromise (June–December 2025): Targeted Traffic Redirection Delivering Chrysalis / Cobalt Strike

6 February 2026 Threat Analyst

1. Executive Summary Notepad++’s update mechanism (WinGUp) was abused in a targeted supply-chain compromise in 2025, where certain users’ update traffic was selectively redirected to attacker-controlled infrastructure and served trojanised…

Vulnerabilities_Exploits

Microsoft January 2026 Patch Tuesday — key takeaways

16 January 2026 Threat Analyst

Microsoft’s January 2026 Patch Tuesday security release shipped fixes for 114 vulnerabilities, including three zero-days (one actively exploited) and eight Critical issues. The bulk of the fixes land in Windows,…

Incident_Reports

SolarWinds Orion Supply-Chain Compromise (SUNBURST / “Solorigate”)

9 January 2026 Threat Analyst

1. Executive Summary The SolarWinds breach (often tracked as SUNBURST by Mandiant/FireEye and Solorigate by Microsoft) was a landmark software supply-chain compromise in which adversaries trojanised signed SolarWinds Orion software…

Uncategorised

Oracle E-Business Suite (EBS) Targeted in Coordinated Intrusion Campaign

5 January 2026 Threat Analyst

ERP Systems Remain a High-Value Objective for Financially Motivated and Ransomware Operators Executive Summary In November 2025, multiple enterprise breach investigations identified Oracle E-Business Suite (EBS) as a deliberate and…

Posts pagination

1 2 3 … 25
Search
Recent Posts
  • Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
  • Payload Ransomware: Early Profile
  • APT33 – Threat Actor Profile
  • BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
  • Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Archives
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe