Cybercrime Exposed Podcast: Social Engineering
In this episode of Cybercrime Exposed, Bluma Janowitz, a social engineer and red team agent, describes two of her engagements to test an organization’s defenses against malicious hackers.
Deck the Halls with Caution: Four Festive Cyber Threats to Look Out for This Season
As we wind down to the end of the year, Intel 471 details four critical cyber threats organizations need to be aware of to ensure they remain vigilant.
Mandiant’s CTO: A Bad Year for Ransomware and Extortion
In this edition of Studio 471, Mandiant CTO Charles Carmakal says half of all ransomware or extortion victims are paying ransoms. Sometimes, that is to prevent the release of sensitive data, while others pay to speed up recov...
Actor yalishanda: A snapshot of a prolific bulletproof hoster
Bulletproof Hosting services are perhaps the biggest enabler of cybercrime within the underground, and for the last decade, one threat actor has maintained prominence: yalishanda.
Malaysian Police Disrupt ‘The Phisherman’
Malaysian police disrupted a massive phishing-as-a-service operation called BulletProftLink that Intel 471 has been tracking. Here’s why that’s important for enterprise security.

Cybercrime Exposed Podcast: The Extortionists
In one long weekend in May 2023, a cybercriminal gang called Clop conducted one of the largest data breaches on record.

Phishing Emails Abusing QR Codes Surge
QR code phishing has surged as cybercriminals revisit this old technique. Here are the trends and how to guard against these kinds of attacks.

A Halloween Story: the 10 Scariest Cyber Threat Stats from Q3
Intel 471 brings you the top 10 cyber threat stats and facts, fresh from our Q3 2023 Quarterly Threat Report, that keep cyber defenders awake at night.

Should Ransom Payments Be Made Illegal?
In this edition of Studio 471, Megan Stifel of the Institute for Security and Technology discusses the Ransomware Task Force, whether ransom payments should be banned and how organizations are improving security.

Detecting and Stopping Malicious Traffic
A cornerstone of security operations is detecting malicious traffic. Here's how we collect high-fidelity indicators of compromise from threat actors that can be routed to firewalls, EDR and SIEM solutions to prevent breaches.