Blog: Stay Ahead of Cyber Threats | Intel 471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Homepage Hero
How Adversaries Try to Interfere with the U.S. Election
Cybercriminals// Malicious Actors// Oct 14, 2024

How Adversaries Try to Interfere with the U.S. Election

Russia, China and Iran have conducted cyber and influence operations ahead of the 2024 U.S. presidential election in November. Here's a look at the tactics used in attempts to disrupt the election.

Is your organisation ready for NIS2?
Security Operations// Oct 14, 2024

Is your organisation ready for NIS2?

The October 17 deadline for EU Member States to transpose the EU’s NIS2 Directive to lift the cyber resilience of critical infrastructure across Europe is here. NIS2 and the rapidly evolving digital threat landscape make it m...

To Deliver Malware, Attackers Use the Phone
Cyber Attacks// Oct 08, 2024

To Deliver Malware, Attackers Use the Phone

Underground call center services are aiding threat actors in delivering malware through callback phishing and negotiating ransoms. Here's a briefing about different attack scenarios and tips for defense.

Cybersecurity Is Every Employees’ Responsibility
Threat Intelligence// Oct 03, 2024

Cybersecurity Is Every Employees’ Responsibility

Cybersecurity Awareness Month is a chance to remind everyone, including employees and customers, that there are simple, effective ways to keep yourself safe online, protect your personal data, and help secure our world.

Are Telegram's New Policies Spooking Cybercriminals?
Cybercriminals// Malicious Actors// Oct 01, 2024

Are Telegram's New Policies Spooking Cybercriminals?

Telegram will now divulge IP addresses and phone numbers in response to valid legal requests. Some cybercriminals are planning to leave Telegram. We assess the impacts of this on visibility into the cybercriminal underground.

Detecting Malware Abusing Google for Command-and-Control
Security Operations// Oct 01, 2024

Detecting Malware Abusing Google for Command-and-Control

Malware often abuses cloud services for command-and-control. It's not a new technique but has been used recently by the Voldemort malware. In this post, we describe two different threat hunts that can detect this activity.

Intel 471 Earns Frost & Sullivan’s 2024 Enabling Technology Leadership Award
Threat Intelligence// Sep 25, 2024

Intel 471 Earns Frost & Sullivan’s 2024 Enabling Technology Leadership Award

Leading industry analyst recognizes Intel 471 for world-class performance as leading global CTI and threat hunt provider for driving growth and impact of operationalized threat intelligence .

Why Russia is a Hotbed of Cybercrime
Geographies// Sep 24, 2024

Why Russia is a Hotbed of Cybercrime

In this Studio 471, Alec Jackson discusses how deep, institutional corruption ties Russian IT professionals, organized criminal groups and the state together and how Russia leverages this to its advantage.

A Look at the Residential Proxy Market
Threat Intelligence// Sep 16, 2024

A Look at the Residential Proxy Market

Cybercriminals proxy connections through residential IP addresses to avoid geoblocks and other security controls. Here's a look at the thriving market for this underground service.

Threat Hunting Case Study: Uncovering FIN7
Threat Intelligence// Sep 10, 2024

Threat Hunting Case Study: Uncovering FIN7

FIN7 is one of the most persistent and capable financially motivated threat actor groups. Here's how to threat hunt for signs of a FIN7 intrusion.