DeepSeek AI poses cybersecurity risks
China-based DeepSeek has upended notions about AI development and prompted security concerns. Here is a briefing on DeepSeek and how cybercriminals are viewing its development.
Law enforcement hammered cybercrime in 2024. Is it working?
In 2024, authorities took aim at ransomware gangs, malware developers, cybercriminal infrastructure and cryptocurrency thieves. Here's a look at the effects of these operations.
How threat actors are using artificial intelligence
Artificial intelligence is a red-hot mess, filled with contradicting predictions over whether it will bring vast benefits. In this Studio 471, Ashley Jess shares her insight into how AI will shape the threat landscape.
Remote Monitoring and Management (RMM) Abuse
Remote Monitoring and Management tools have been legitimately used by IT professionals, managed service providers and system administrators. However, these capabilities can be abused and exploited when in a threat actor's han...
How ransomware may trend in 2025
New variants and threat actor groups kept up the tempo of ransomware attacks in 2024. Here's a look at how this type of pervasive cybercrime may trend this year.
![Threat hunting case study: PsExec](https://intel-website.transforms.svdcdn.com/production/PsExec-listing.jpeg?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1737504546&s=2a5370f8e09d10fc8a0a34e1b63af0f3 570w)
Threat hunting case study: PsExec
PsExec, a command-line utility used for remotely managing Windows computers, is often abused by threat actors. Here's how to threat hunt for suspicious PsExec activity.
![What 2025 May Hold for Cybersecurity](https://intel-website.transforms.svdcdn.com/production/AdobeStock_935730436.jpeg?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1734909068&s=459def347b67e1268739082d13d52311 570w)
What 2025 May Hold for Cybersecurity
Here are insights into what 2025 may hold in cybersecurity based on Intel 471’s historical analyses of trends and intelligence collection.
![Bring Your Own Hunts to HUNTER471](https://intel-website.transforms.svdcdn.com/production/BYOH-Blog-Intel-471.jpeg?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1734908679&s=d02252e0aa738573195c1ccd8adf2b5e 570w)
Bring Your Own Hunts to HUNTER471
As a HUNTER471 customer utilizing the Hunt Management Module (HMM), you can now “bring your own” (BYO) threat hunting content to the HUNTER471 threat hunting platform.
![Collecting Useful CTI from Underground Markets](https://intel-website.transforms.svdcdn.com/production/Collecting-useful-CTI-from-underground-markets-Studio-471.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1734908595&s=2f3674c9220b54c0d2c84ae12028c02a 570w)
Collecting Useful CTI from Underground Markets
Extracting cyber threat intelligence on emerging threats and novel threat actors is challenging. Michele Campobasso completed his doctoral thesis in 2024 at Eindhoven University of Technology, and in Studio 471, he shares ins...
![‘Tis the Season to Be Alert for Cyber Threats: 5 Unjoyful Holiday Tactics](https://intel-website.transforms.svdcdn.com/production/Holiday-Threats-Intel-471-Dec24.jpeg?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1734908353&s=258b659a04b9e1345cbfdcc4e9626c77 570w)
‘Tis the Season to Be Alert for Cyber Threats: 5 Unjoyful Holiday Tactics
Amidst the holiday bustle, while many are busy decking the halls, cyber adversaries are busy trimming up the cyber underground for peak cybercrime season. It’s the time of the year that threat actors deploy phishing scams and...