Skip to content
  • Sun. Feb 22nd, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Phishing

Latest Post

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV Payload Ransomware: Early Profile APT33 – Threat Actor Profile BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

EDITOR'S CHOICE

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst
Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst
Vulnerabilities_Exploits

Act now! In-the-wild Zimbra vulnerability needs a workaround

18 July 2023 Threat Analyst

Security experts are warning Zimbra users that a vulnerability for which there is no patch is being actively exploited in the wild. In a security update about the vulnerability, the…

Incident_Reports Industry_News Vulnerabilities_Exploits

Hackers exploiting critical WordPress WooCommerce Payments bug

18 July 2023 Threat Analyst

Hackers are conducting widespread exploitation of a critical WooCommerce Payments plugin to gain the privileges of any users, including administrators, on vulnerable WordPress installation. Source: https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-wordpress-woocommerce-payments-bug/

Trends_Analysis Vulnerabilities_Exploits

Active Exploitation of Multiple Adobe ColdFusion Vulnerabilities

17 July 2023 Threat Analyst

Rapid7 managed services teams have observed exploitation of Adobe ColdFusion in multiple customer environments. The attacks our team has responded to thus far appear to be chaining CVE-2023-29298 , a…

Techniques_Tactics_Procedures

A technical analysis of the Quasar-forked RAT called VoidRAT

17 July 2023 Threat Analyst

https://resources.securityscorecard.com/research/technical-analysis-of-the-quasar-forked-rat-called-void-rat Source: A technical analysis of the Quasar-forked RAT called VoidRAT / SecurityScoreCard

Techniques_Tactics_Procedures Threat_Actor_Profiles

Black Basta Overview

17 July 2023 Threat Analyst

Black Basta is a Russian-speaking group that was first spotted in early 2022. It is known for its double extortion attack, where it not only executes ransomware but also exfiltrates…

Industry_News Trends_Analysis

ISC China Report Summary

13 July 2023 Threat Analyst

Original Document: https://isc.independent.gov.uk/wp-content/uploads/2023/07/ISC-China.pdf The “China” report by the Intelligence and Security Committee of Parliament provides an in-depth analysis of the perceived threats and challenges posed by China to the UK.…

Techniques_Tactics_Procedures Threat_Actor_Profiles

SmokeLoader malware

17 June 2023 Threat Analyst

SmokeLoader, also known as Dofoil, is a modular bot used primarily to download other malware onto a compromised system. It has been in operation since at least 2011 and has…

Industry_News Trends_Analysis

ISC Russia Report Summary

1 January 2023 Threat Analyst

https://isc.independent.gov.uk/wp-content/uploads/2021/03/CCS207_CCS0221966010-001_Russia-Report-v02-Web_Accessible.pdf The “Russia” report by the Intelligence and Security Committee of Parliament provides an in-depth analysis of the perceived threats and challenges posed by Russia to the UK. Here are…

Industry_News Trends_Analysis

2022 Global Threat Intelligence Report by NTT Security

1 January 2023 Threat Analyst

https://www.security.ntt/pdf/2022-global-threat-intelligence-report-v8.pdf The 2022 Global Threat Intelligence Report by NTT Security Holdings highlights several key trends and events in the cybersecurity landscape:

Incident_Reports

Brenntag Ransomware Attack

17 July 2022 Threat Analyst

In April, Brenntag, a global chemical distribution company, was hit by a ransomware attack. The DarkSide hacker group claimed responsibility, extracting a significant ransom payment. The attack resulted in a…

Posts pagination

1 … 21 22 23 … 25
Search
Recent Posts
  • Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
  • Payload Ransomware: Early Profile
  • APT33 – Threat Actor Profile
  • BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
  • Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Archives
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe