Skip to content
  • Sun. May 11th, 2025
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Malware_Detection
  • Vulnerability Management
  • Cybercrime_Organizations
  • Phishing
  • Ransomware

Latest Post

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
  • Latest
  • Popular
  • Trending
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
Incident_Reports
Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
Articles Vulnerabilities_Exploits
Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
Vulnerabilities_Exploits
Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
Articles Techniques_Tactics_Procedures
File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

EDITOR'S CHOICE

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
Vulnerabilities_Exploits

Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws

9 October 2024 Threat Analyst
Incident_Reports

Alleged Credit Suisse Data Breach: Employee Data Compromised

8 October 2024 Threat Analyst
Articles Industry_News Threat_Actor_Profiles

Evil Corp and LockBit Connection Exposed: NCA Unmasks Cybercrime Kingpin

1 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures Threat_Actor_Profiles

Leveraging Windows Event Logs to Identify Human-Operated Ransomware: Insights from JPCERT/CC

30 September 2024 Threat Analyst
Techniques_Tactics_Procedures

LummaC2: Obfuscation Through Indirect Control Flow

27 September 2024 Threat Analyst
Articles

CTI Trends – September 2024

27 September 2024 Threat Analyst
Threat_Actor_Profiles Trends_Analysis

Dev Popper Campaign (May 2024): Hackers Exploit Fake Job Interviews to Distribute Python-based RAT Targeting Developers

21 June 2024 Threat Analyst

In May 2024, cybersecurity researchers uncovered a sophisticated attack campaign known as “Dev Popper,” where hackers posed as recruiters conducting fake job interviews to distribute a Python-based Remote Access Trojan…

Incident_Reports

Pro-Russian Hacktivist Attacks on Water Infrastructure (May 2024): OT Systems Targeted in U.S. and European Water Facilities

17 June 2024 Threat Analyst

In May 2024, pro-Russian hacktivist groups launched a coordinated series of cyberattacks on water infrastructure in both the United States and Europe. These attacks targeted Operational Technology (OT) systems, which…

Incident_Reports

Cencora (Healthcare Sector) Cyberattack: May 2024 Data Breach

10 June 2024 Threat Analyst

In May 2024, Cencora, a major player in the U.S. healthcare sector, suffered a significant cyberattack resulting in a data breach that compromised sensitive patient and organisational data. Cencora, previously…

Industry_News

Okta Credential Stuffing Attacks Surge in May 2024: Okta Advises Enhanced Security with ThreatInsight

10 June 2024 Threat Analyst

In May 2024, Okta, a leading provider of identity and access management (IAM) solutions, reported a significant increase in credential stuffing attacks targeting its user base. These attacks, which involve…

Vulnerabilities_Exploits

Microsoft Patch Tuesday (May 2024): Breakdown of 60 Vulnerabilities, Including Active Zero-Day Exploits

22 May 2024 Threat Analyst

Microsoft’s Patch Tuesday in May 2024 addressed 60 vulnerabilities across a wide range of its products, including Windows, Microsoft Office, and Azure. Among these, several critical zero-day vulnerabilities were actively…

Incident_Reports

Rhysida Ransomware Attack on Singing River Health System: Data of 895,000 Individuals Exfiltrated

21 May 2024 Threat Analyst

On May 14th, 2024, the Rhysida ransomware group executed a highly disruptive cyberattack on Singing River Health System, compromising the personal data of approximately 895,000 individuals. The attack resulted in…

Incident_Reports

RansomHub Ransomware Attack on Christie’s Auction House: Live Auctions Delayed and Website Taken Offline

17 May 2024 Threat Analyst

On May 12th, 2024, Christie’s Auction House fell victim to a ransomware attack orchestrated by the RansomHub group. The attack forced Christie’s to temporarily shut down its website and delay…

Incident_Reports

BlackBasta Ransomware Attack on Ascension Health: Clinical Operations Disrupted

17 May 2024 Threat Analyst

On May 8th, 2024, Ascension Health, one of the largest Catholic health systems in the U.S., became the victim of a ransomware attack by the BlackBasta group. The cyberattack caused…

Incident_Reports

LockBit Ransomware Disrupts Wichita Government: Shutdown of Systems and Critical Services

16 May 2024 Threat Analyst

On May 5th, 2024, the city of Wichita, Kansas, experienced significant disruptions after a LockBit ransomware attack targeted its government systems. The attack forced the shutdown of several critical services,…

Incident_Reports

DragonForce Ransomware Attack on Ohio Lottery: 500,000 Personal Records Compromised

15 May 2024 Threat Analyst

On May 9th, 2024, the Ohio Lottery was hit by a ransomware attack carried out by the cybercriminal group DragonForce. In this attack, over 500,000 personal records of Ohio Lottery…

Posts pagination

1 … 3 4 5 … 20
Search
Recent Posts
  • Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum
  • Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History
  • Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation
  • File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis
  • Microsoft’s October 2024 Patch Tuesday: Five Zero-Day Vulnerabilities Fixed, Including Actively Exploited Flaws
Archives
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Incident_Reports

Cisco Investigates Data Breach: Sensitive Information Reportedly For Sale on Hacking Forum

15 October 2024 Threat Analyst
Articles Vulnerabilities_Exploits

Nation-State Adversaries Exploit Ivanti CSA Zero-Days: A Deep Dive into Targeted Attacks and Vulnerability History

15 October 2024 Threat Analyst
Vulnerabilities_Exploits

Ivanti CSA Hit with Three New Zero-Day Vulnerabilities in Active Exploitation

9 October 2024 Threat Analyst
Articles Techniques_Tactics_Procedures

File Hosting Services Misused for Identity Phishing: Microsoft’s Analysis

9 October 2024 Threat Analyst
TIR

TIR

© Copyright 2024 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills