Skip to content
  • Sun. Feb 22nd, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Phishing

Latest Post

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV Payload Ransomware: Early Profile APT33 – Threat Actor Profile BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

EDITOR'S CHOICE

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst
Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst
Industry_News Threat_Actor_Profiles

Unmasking Shadows: How a Cybercriminal Accidentally Revealed His Identity

18 July 2023 Threat Analyst

In a fascinating turn of events, a threat actor known by the online moniker ‘La_Citrix’ inadvertently exposed their real identity by infecting their own computer with an information stealer. This…

Tools_Resources

Tools – Cyberchef v10 released

18 July 2023 Threat Analyst

GCHQ, the UK's intelligence, security, and cyber agency, has just announced the release of CyberChef v10. This latest version of the "Cyber Swiss Army Knife" introduces a host of new…

Threat_Actor_Profiles

FIN8 Cybercrime Group

18 July 2023 Threat Analyst

In the ever-evolving landscape of cyber threats, the financially motivated cybercrime group known as FIN8 continues to make waves. Known for their sporadic yet impactful attacks, FIN8 has been active…

Industry_News Threat_Actor_Profiles

Exploring TA453’s Foray into LNKs and Mac Malware – Proofpoint Report

18 July 2023 Threat Analyst

"Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware" published by Proofpoint discusses the evolving tactics of TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and…

Incident_Reports Industry_News

Inside Job: IT Security Analyst Convicted for Exploiting Ransomware Attack on Oxford Biomedica

18 July 2023 Threat Analyst

Ashley Liles, a 28-year-old former IT security analyst from Letchworth Garden City in Hertfordshire, has been convicted of blackmail and unauthorized access to a computer with intent to commit other…

Industry_News

Unmasking AVrecon: The Stealthy Malware Infiltrating Global Routers – Lumen Report

18 July 2023 Threat Analyst

Lumen Technologies, formerly known as CenturyLink, is a global technology company that provides a wide range of services, including communications, network services, security, cloud solutions, voice, and managed services. The…

Tools_Resources Trends_Analysis

Overcoming the Top Ten Challenges in Open Source Intelligence (OSINT): A Comprehensive Introduction

18 July 2023 Threat Analyst

Open Source Intelligence (OSINT) has become an indispensable tool in the digital age, providing a wealth of information from publicly available sources. It is used extensively in various fields, from…

Incident_Reports Industry_News

JumpCloud Security Breach

18 July 2023 Threat Analyst

JumpCloud, a US-based enterprise software firm known for its cloud directory platform, recently disclosed a security breach that was part of a highly targeted operation aimed at a select group…

Incident_Reports Industry_News Techniques_Tactics_Procedures Threat_Actor_Profiles

TeamTNT’s Cloud Credential Stealing Campaign

18 July 2023 Threat Analyst

In the ever-evolving landscape of cybersecurity, threat actors continue to innovate and adapt their methods to exploit new technologies and platforms. One such group, known as TeamTNT, has been actively…

Incident_Reports Industry_News

In-Depth Analysis of Storm-0558 Techniques for Unauthorized Email Access

18 July 2023 Threat Analyst

This blog post is based on the detailed analysis provided by Microsoft Security Blog on the techniques used by the threat actor tracked as Storm-0558 for unauthorized email access. Executive…

Posts pagination

1 … 20 21 22 … 25
Search
Recent Posts
  • Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
  • Payload Ransomware: Early Profile
  • APT33 – Threat Actor Profile
  • BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
  • Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Archives
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe