Skip to content
  • Tue. Mar 31st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Nation_State_Actors

Latest Post

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

EDITOR'S CHOICE

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
Articles

BadPaw and MeowMeow: steganographic .NET malware hits Ukrainian targets

12 March 2026 Threat Analyst
Articles

UAT-9244 hits South American telcos with TernDoor, PeerTime and BruteEntry

6 March 2026 Threat Analyst
Articles

BadAudio and APT24: “good enough” OPSEC powering a multi-vector espionage chain

2 March 2026 Threat Analyst
Articles

Iran crisis cyber risk rises as defacements and disruptive activity reported

2 March 2026 Threat Analyst
Articles

OpenClaw “ClawJacked” chain: malicious websites can hijack local AI agents via localhost WebSockets

2 March 2026 Threat Analyst
Articles

Lazarus-linked activity using Medusa ransomware

24 February 2026 Threat Analyst

Summary: Symantec links Lazarus tooling to Medusa RaaS extortion activity observed in the Middle East and against a U.S. healthcare target. 1. Executive Summary Broadcom/Symantec’s Threat Hunter Team reported North…

Threat_Actor_Profiles

BLACK BASTA – Threat Actor Profile

24 February 2026 Threat Analyst

Operational profile of the Black Basta ransomware ecosystem (2022–2026)Black Basta, BASTA, ransomware, RaaS, double extortion, UNC4393, Storm-1811, QakBot, DarkGate, Quick Assist, vishing, MITRE ATT&CK Executive overview Black Basta (also written…

Incident_Reports

FICOBA breach exposes data linked to 1.2 million French bank accounts

23 February 2026 Threat Analyst

1. Executive Summary France’s Ministry of the Economy and Finance disclosed unauthorised access to FICOBA, the national registry of bank accounts, affecting data associated with approximately 1.2 million accounts. According…

Threat_Actor_Profiles

Threat Actor Profile: APT42 (MITRE G1044)

23 February 2026 Threat Analyst

1) Executive overview APT42 is an Iran-aligned cyber espionage and surveillance actor assessed by multiple vendors as state-sponsored. Mandiant assesses with high confidence that APT42 conducts information collection and surveillance…

Articles

Cyber Threats Facing UK Further and Higher Education

22 February 2026 Threat Analyst

1. Executive Summary UK further education (FE) colleges and higher education (HE) institutions face a persistently high-volume threat environment driven by phishing, account compromise, ransomware/extortion, and periodic surges in denial-of-service…

Threat_Actor_Profiles

Peaklight malware: Stealthy memory-resident delivery chain abusing LNK, mshta, CDN and WebDAV

21 February 2026 Threat Analyst

Peaklight malware deep dive, peaklight, emmenhtal, in-memory malware, lnk, mshta, powershell, bunnycdn, webdav, cryptbot, lumma, shadowladder, hijackloader, threat hunting, incident response, mitre att&ck 1. Executive Summary Peaklight (also tracked as…

Articles

Payload Ransomware: Early Profile

21 February 2026 Threat Analyst

Tags: Payload ransomware, data broker extortion, double extortion, Tor leak site, ESXi ransomware, RECOVERY-xx0001.txt, IOCs, incident response Published: 21 February 2026 (Europe/London) 1. Executive Summary Payload is an emerging ransomware…

Techniques_Tactics_Procedures Threat_Actor_Profiles

APT33 – Threat Actor Profile

21 February 2026 Threat Analyst

APT33, Elfin, Peach Sandstorm, HOLMIUM, Refined Kitten, Iran, aerospace, energy, petrochemical, spearphishing, password spraying, Outlook Home Page, Ruler, TurnedUp, DropShot, ShapeShift, StoneDrill 1. Executive Summary APT33 is a suspected Iranian…

Vulnerabilities_Exploits

BeyondTrust CVE-2026-1731: Pre-auth RCE escalates from rapid scanning to ransomware-linked intrusions

21 February 2026 Threat Analyst

CISA has now flagged CVE-2026-1731—a critical, pre-authentication remote code execution flaw in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) as being used in ransomware campaigns, signalling that exploitation…

Vulnerabilities_Exploits

Ivanti EPMM Pre-Auth RCE (CVE-2026-1281) Under Active Exploitation

21 February 2026 Threat Analyst

Ivanti Endpoint Manager Mobile (EPMM) sits in a uniquely privileged position: it manages device enrollment, policy enforcement, and app/content distribution across entire mobile fleets. When an internet-facing EPMM server is…

Posts pagination

1 … 3 4 5 … 29
Search
Recent Posts
  • OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
  • Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
  • Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
  • Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
  • Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Archives
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
TIR

TIR

© Copyright 2026 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe