Blog: Stay Ahead of Cyber Threats | Intel 471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Hero background fallback
Threat hunting case study: PsExec
Threat Hunting// Jan 21, 2025

Threat hunting case study: PsExec

PsExec, a command-line utility used for remotely managing Windows computers, is often abused by threat actors. Here's how to threat hunt for suspicious PsExec activity.

What 2025 May Hold for Cybersecurity
Emerging Threats// Jan 08, 2025

What 2025 May Hold for Cybersecurity

Here are insights into what 2025 may hold in cybersecurity based on Intel 471’s historical analyses of trends and intelligence collection.

Bring Your Own Hunts to HUNTER471
Threat Hunting// Dec 18, 2024

Bring Your Own Hunts to HUNTER471

As a HUNTER471 customer utilizing the Hunt Management Module (HMM), you can now “bring your own” (BYO) threat hunting content to the HUNTER471 threat hunting platform.

Collecting Useful CTI from Underground Markets
Threat Intelligence// Dec 17, 2024

Collecting Useful CTI from Underground Markets

Extracting cyber threat intelligence on emerging threats and novel threat actors is challenging. Michele Campobasso completed his doctoral thesis in 2024 at Eindhoven University of Technology, and in Studio 471, he shares ins...

‘Tis the Season to Be Alert for Cyber Threats: 5 Unjoyful Holiday Tactics
Threat Intelligence// Dec 17, 2024

‘Tis the Season to Be Alert for Cyber Threats: 5 Unjoyful Holiday Tactics

Amidst the holiday bustle, while many are busy decking the halls, cyber adversaries are busy trimming up the cyber underground for peak cybercrime season. It’s the time of the year that threat actors deploy phishing scams and...

Expanding source coverage: adding Signal chats to threat intelligence
Threat Intelligence// Dec 16, 2024

Expanding source coverage: adding Signal chats to threat intelligence

Cybercriminals need easy ways to communicate, connect, and plan, whether they’re trading stolen credentials, rallying hacktivists, or mounting a targeted attack. Instant messaging platforms meet this need and are now an essen...

Threat hunting case study: Cozy Bear
Security Operations// Dec 11, 2024

Threat hunting case study: Cozy Bear

Cozy Bear is a Russian, state-sponsored group that has conducted operations on behalf of Russia’s Foreign Intelligence Service aka SVR. Here's how to use the HUNTER471 platform to threat hunt for this group.

Holiday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breaches
Cybercriminals// Malicious Actors// Dec 10, 2024

Holiday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breaches

The surge in online shopping and travel bookings during the holiday season offers rich pickings for cybercriminals. Black Friday, Cyber Monday, Christmas shopping, and increased travel throughout December offer ample opportun...

Holiday Season Cyber Threats (Part 1): Phishing, Fake Shops and Bogus Bookings
Threat Intelligence// Dec 06, 2024

Holiday Season Cyber Threats (Part 1): Phishing, Fake Shops and Bogus Bookings

The holiday season is here. It’s a time for reuniting with family and friends, travel and gift-giving. It’s also a prime time for cybercrime as millions of consumers head to online checkouts on Black Friday, Cyber Monday, Giv...

Cybercrime Exposed Podcast: Raccoon Stealer
Cybercriminals// Malicious Actors// Dec 05, 2024

Cybercrime Exposed Podcast: Raccoon Stealer

Information stealing malware is one of the most common ways that organizations end up infiltrated by malicious hackers. For several years, one type of infostealer called Raccoon Stealer ruled them all.

Featured Resource
Intel 471 Logo 2024

AresLoader is a new loader malware-as-a-service (MaaS) offered by threat actors with links to Russian hacktivism that was spotted recently in the wild.