Skip to content
  • Sat. Feb 21st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Phishing

Latest Post

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV Payload Ransomware: Early Profile APT33 – Threat Actor Profile BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
Threat_Actor_Profiles
Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
Articles
Payload Ransomware: Early Profile
Techniques_Tactics_Procedures Threat_Actor_Profiles
APT33 – Threat Actor Profile
Vulnerabilities_Exploits
BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

EDITOR'S CHOICE

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst
Articles

EDR Killers in 2026: The most common ways attackers neutralize endpoint security — and how to stop them

21 February 2026 Threat Analyst
Articles

BYOVD in 2026: the signed-driver loophole powering EDR bypass at scale

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles Vulnerabilities_Exploits

APT29 (Cozy Bear / The Dukes / Midnight Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

20 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT31 (Violet Typhoon / ZIRCONIUM) – Threat Actor Profile

20 February 2026 Threat Analyst
Incident_Reports

Ashley Madison Breach of 2015

17 July 2020 Threat Analyst

In July 2015, Ashley Madison, a Canadian online dating service marketed to people who are married or in relationships, was hacked by a group calling itself The Impact Team. The…

Incident_Reports

2015 OPM Data Breach: Lessons in Cybersecurity

17 July 2020 Threat Analyst

In June 2015, the U.S. Office of Personnel Management (OPM) announced a substantial data breach, marking one of the most significant breaches in U.S. government history. Initially, the breach was…

Incident_Reports

The Anthem Data Breach of 2015: Navigating the Cybersecurity Landscape

17 July 2020 Threat Analyst

In February 2015, Anthem, one of the largest health insurance companies in the U.S., suffered a data breach that led to the exposure of personal information of nearly 78.8 million…

Incident_Reports

2014 Sony Pictures Entertainment Breach

17 July 2020 Threat Analyst

The cyber attack on Sony Pictures Entertainment in 2014 was a meticulously planned operation that began with careful preparation well in advance of the publicized attack date. The attackers accessed…

Threat_Actor_Profiles

The Zeus Botnet

17 July 2020 Threat Analyst

Zeus, known as Zbot, is a notorious Trojan horse malware package that predominantly targets Microsoft Windows. The primary aim of Zeus has been to steal sensitive data, especially banking information…

Incident_Reports

Operation Aurora : A Deep Dive into the 2010 State-Sponsored Cyber Attack

17 July 2020 Threat Analyst

Operation Aurora: a modern CTI deep dive into the 2009–2010 intrusion setOperational CTI, incident response, nation-state tradecraft, CVE-2010-0249, Internet Explorer, Hydraq, Elderwood, IP theft, source code compromise, spearphishing, watering hole…

Incident_Reports

Unveiling Stuxnet: A Deep Dive into the Pioneering Cyber Weapon Targeting Industrial Control Systems

17 July 2020 Threat Analyst

Stuxnet, first discovered in 2010, was a malicious computer worm that caused substantial damage to Iran's nuclear program. The worm targeted supervisory control and data acquisition (SCADA) systems. It is…

Incident_Reports

The 2014 eBay Data Breach: An In-depth Look

17 June 2020 Threat Analyst

The eBay cyberattack in May 2014 stands as one of the most substantial cybersecurity incidents of the year. The breach compromised a database containing encrypted passwords and other non-financial data.…

Incident_Reports

2014 JP Morgan Chase breach

17 June 2020 Threat Analyst

In 2014, JPMorgan Chase, one of the world’s leading financial institutions, suffered one of the most significant data breaches in history. The attackers compromised data from 76 million households and…

Incident_Reports

The 2013-2014 Target Data Breach

17 May 2020 Threat Analyst

Although the initial breach occurred in late 2013, the impact and implications of the Target data breach were felt well into 2014 and beyond. The breach saw the theft of…

Posts pagination

1 … 24 25
Search
Recent Posts
  • Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV
  • Payload Ransomware: Early Profile
  • APT33 – Threat Actor Profile
  • BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions
  • Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation
Archives
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst
Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst
Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst
Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy
  • Subscribe