Intel 471 Blog

Cutting edge threat intelligence and research

The 7 common traits among highly successful cybercriminals: Part I

The 7 common traits among highly successful cybercriminals: Part I

Jun 21, 2022

By pinpointing common behaviors , organizations can develop mitigation efforts by anticipating threat actors’ specific characteristics.

Cybercriminals preying on travel surge with a host of different scams

Cybercriminals preying on travel surge with a host of different scams

Jun 15, 2022

The relationship between access brokers and ransomware crews is growing

The relationship between access brokers and ransomware crews is growing

Jun 02, 2022

Ransomware crews need access to launch their attacks. This is who is selling it to them.

What malware to look for if you want to prevent a ransomware attack

What malware to look for if you want to prevent a ransomware attack

May 12, 2022

Ransomware attacks start way before ransomware is placed onto a network. Here is the malware you need to watch out for.

Cybercrime loves company: Conti cooperated with other ransomware gangs

Cybercrime loves company: Conti cooperated with other ransomware gangs

May 05, 2022

Conti kept a close eye on other ransomware groups and borrowed some of their techniques and best practices for their own operations.

Conti and Emotet: A constantly destructive duo

Conti and Emotet: A constantly destructive duo

Apr 26, 2022

The Conti Leaks show just how crucial Emotet has been to Conti’s ransomware schemes.

Move fast and commit crimes: Conti’s development teams mirror corporate tech

Move fast and commit crimes: Conti’s development teams mirror corporate tech

Apr 05, 2022

By mirroring the corporate culture of most technology companies, it changes the paradigm for organizations that need to protect themselves.

Source code leaks a key cog in malware development life cycle

Source code leaks a key cog in malware development life cycle

Mar 29, 2022

By examining what happened in the aftermath of past leaks, organizations can better formulate security strategies to defend against future attacks.

Showing 1-8 of 91 entries.
1 2 3 4 5 6 7 8 9 10 11 12