Skip to content
  • Fri. Mar 27th, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Nation_State_Actors

Latest Post

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

EDITOR'S CHOICE

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
Articles

BadPaw and MeowMeow: steganographic .NET malware hits Ukrainian targets

12 March 2026 Threat Analyst
Articles

UAT-9244 hits South American telcos with TernDoor, PeerTime and BruteEntry

6 March 2026 Threat Analyst
Articles

BadAudio and APT24: “good enough” OPSEC powering a multi-vector espionage chain

2 March 2026 Threat Analyst
Articles

Iran crisis cyber risk rises as defacements and disruptive activity reported

2 March 2026 Threat Analyst
Articles

OpenClaw “ClawJacked” chain: malicious websites can hijack local AI agents via localhost WebSockets

2 March 2026 Threat Analyst
Industry_News

Cyber Threat Intelligence and Cybersecurity Industry Trends in Q2 2023

27 July 2023 Threat Analyst

In the ever-evolving landscape of cybersecurity, staying ahead of threats is a constant challenge. This blog post will delve into the key trends in Cyber Threat Intelligence (CTI) and wider…

Threat_Actor_Profiles

Threat actor profile: APT37 (ScarCruft / Reaper)

27 July 2023 Threat Analyst

APT37, also known as Reaper, Group123, Ricochet Chollima, StarCruft, and Scarcruft, is a cyber espionage group that

Techniques_Tactics_Procedures Threat_Actor_Profiles

Threat Actor Profile: APT36

27 July 2023 Threat Analyst

Introduction APT36, also known as Earth Karkaddan, is a cyber-espionage group that has been active since at least 2016. The group is believed to be based in Pakistan and has…

Industry_News Threat_Actor_Profiles

Threat Actor Profile: APT35

27 July 2023 Threat Analyst

APT35, also known as Phosphorus, Charming Kitten, and Ajax Security Team, is an Iranian threat actor that has been active since at least 2014. The group has targeted organisations across…

Industry_News Trends_Analysis

The Emergence of FraudGPT

26 July 2023 Threat Analyst

The cyber threat landscape is continually evolving, with threat actors leveraging advanced technologies to carry out sophisticated attacks. One such development is the emergence of FraudGPT, a new artificial intelligence…

Incident_Reports Vulnerabilities_Exploits

MikroTik RouterOS Vulnerability: CVE-2023-30799

26 July 2023 Threat Analyst

Introduction In a recent blog post by VulnCheck, a vulnerability in MikroTik RouterOS was discussed in detail. The vulnerability, identified as CVE-2023-30799, affects MikroTik RouterOS up until version 6.49.8 (July…

Techniques_Tactics_Procedures Threat_Actor_Profiles Trends_Analysis

The Future of APT Analysis: Navigating the Evolving Threat Landscape

26 July 2023 Threat Analyst

The cybersecurity landscape is a complex and ever-evolving space, with Advanced Persistent Threat (APT) actors and ransomware attackers continuously developing their skills and learning from their mistakes and peers. As…

Techniques_Tactics_Procedures Threat_Actor_Profiles

Threat Actor Profile: APT34

26 July 2023 Threat Analyst

APT34, also known as OilRig, is a suspected Iranian cyber espionage threat group that has been operational since at least 2014. The group is believed to work on behalf of…

Threat_Actor_Profiles

Examining the Johnson-Lebedev Connection & Implications

26 July 2023 Threat Analyst

This report aims to provide an analysis of the relationship between former UK Prime Minister Boris Johnson and Evgeny Lebedev, a media mogul and son of a former KGB agent.…

Industry_News Techniques_Tactics_Procedures

Outlook Email Authentication Bypass: Display Name Obfuscation

25 July 2023 Threat Analyst

Original Source: GitLab Repository The Vulnerability The issue lies in the “display name” of an email’s “From” header in Outlook. It appears that this display name can be manipulated to…

Posts pagination

1 … 19 20 21 … 29
Search
Recent Posts
  • OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
  • Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
  • Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
  • Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
  • Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Archives
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
TIR

TIR

© Copyright 2026 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe