Intel471-Logo-white.png
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Exposure Mode Blog Listing.jpeg

Bridging the CTI Gap: New Exposure Modules on Verity471 Deliver Market-Disrupting Views of Threats

Intel 471 is thrilled to announce the availability of our new Cyber Threat Exposure portfolio of solutions on Verity471, our game-changing CTI-powered SaaS platform, Verity471.

Introducing Verity471 Blog.jpeg

Introducing Verity471: Cyber Threat Intelligence Ready to Operationalize

To shatter the cycle of reactive defense, Intel 471 is launching Verity471, the evolution of our trusted cyber intelligence platform, TITAN.

Guided-Threat-Hunts-Intel-471-Cyber-Threat-Hunting.jpeg
Threat Hunting//

Guided Threat Hunts Takes Your Behavioral Threat Hunting to the Next Level

Guided Threat Hunts offers a library of Pivot Queries for hundreds of hunt packages that enable your threat hunters and analysts to overcome uncertainty and boost productivity. Guided Threat Hunts is a set of packages that assists users modify their result set to decide their next step and filter out noise from extraneous results.  

Studio-471-Defending-against-doxing-Image.png
Cybercriminals// Malicious Actors//

Defending against doxing

In this Studio 471, Jacob Larsen discusses the effects of doxing, how sites like Doxbin take advantage of legal loopholes and how to defend against being doxed.

listinglumma.jpeg
Security Operations//

Threat hunting case study: Lumma infostealer

The Lumma infostealer malware collects highly sensitive data including logins and session tokens. Here's how to conduct a threat hunt leveraging up-to-date tactics, techniques and procedures used by Lumma.

hacktivism-listing.jpeg
Threat Intelligence//

Pro-Russian hacktivism: Shifting alliances, new groups and risks

Pro-Russian hacktivism campaigns continued to be directed at countries and entities supporting Ukraine. Here's a briefing about new hacktivist groups and the risks the groups pose.

Intel 471 Logo 2024.png
Emerging Threats//

mommy Access Broker

mommy Access Broker is enabling access-as-a-service operations through detailed intrusion guides and compromised credentials, and Intel 471 has released reporting and Hunt Packages to support threat hunting and detection.

AdobeStock_595371799_Editorial_Use_Only.jpeg
Cyber Attacks//

NATO summit commences in tandem with tense cyber, kinetic conflict

NATO's annual summit comes as member countries face a rapidly changing global security dynamic, with cyber playing a significant role.

tinkerlisting_2025-06-18-042358_efht.jpeg
Cybercriminals// Malicious Actors//

A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator

The leader of the Black Basta ransomware group employed a trusted, experienced cybercrime actor nicknamed Tinker who he relied on for phishing content, call center management and negotiation skills.

listingdragonforce.jpeg
Threat Hunting//

Threat hunting case study: DragonForce

After compromising a system, attackers seek ways to maintain persistence. Here's how to threat hunt for a common persistence method used by attackers including DragonForce.

1...

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.