Pro-Russian hacktivism: Shifting alliances, new groups and risks
Pro-Russian hacktivism campaigns continued to be directed at countries and entities supporting Ukraine. Here's a briefing about new hacktivist groups and the risks the groups pose.
NATO summit commences in tandem with tense cyber, kinetic conflict
NATO's annual summit comes as member countries face a rapidly changing global security dynamic, with cyber playing a significant role.
To Deliver Malware, Attackers Use the Phone
Underground call center services are aiding threat actors in delivering malware through callback phishing and negotiating ransoms. Here's a briefing about different attack scenarios and tips for defense.
How cybercriminals exploit the hospitality industry
In the second half of 2023, the hospitality industry was increasingly targeted by spam and social-engineering campaigns that led to malicious software.
Deck the Halls with Caution: Four Festive Cyber Threats to Look Out for This Season
As we wind down to the end of the year, Intel 471 details four critical cyber threats organizations need to be aware of to ensure they remain vigilant.

Cryptocurrency Malware: An Ever-Adapting Threat
Despite the downturn in the cryptocurrency market, there remains an appetite for "cryware" or cryptocurrency malware, which steals digital currencies.

Countering the Problem of Credential Theft
One of the most tangible threats to enterprises are initial access brokers, who steal and then sell login credentials and access to other threat actors, such as ransomware gangs. Here's an evaluation of this cybercrime-a...

A reset on ransomware: Dominant variants differ from prior years
While law enforcement around the world has gotten more aggressive, the RaaS groups currently dominating the ecosystem are completely different than just a few months ago.

How cryptomixers allow cybercriminals to clean their ransoms
A thorough understanding of these mixing services' operational underpinnings is key to comprehending how criminals are laundering the money.

Cybercrime underground flush with shipping companies’ credentials
The actors responsible for selling these credentials range from newcomers to the most prolific network access brokers that Intel 471 tracks.