Threat hunting case study: Cozy Bear
Cozy Bear is a Russian, state-sponsored group that has conducted operations on behalf of Russia’s Foreign Intelligence Service aka SVR. Here's how to use the HUNTER471 platform to threat hunt for this group.
Using CTI in Realistic Attack Simulations
Australia holds regular exercises to test the cyber resiliency of the financial services sector. In this Studio 471, two experts from the cybersecurity consultancy CyberCX discuss how these exercises are developed using cyber...
Is your organisation ready for NIS2?
The October 17 deadline for EU Member States to transpose the EU’s NIS2 Directive to lift the cyber resilience of critical infrastructure across Europe is here. NIS2 and the rapidly evolving digital threat landscape make it m...
Detecting Malware Abusing Google for Command-and-Control
Malware often abuses cloud services for command-and-control. It's not a new technique but has been used recently by the Voldemort malware. In this post, we describe two different threat hunts that can detect this activit...
Introducing the CTI Capability Maturity Model, a resource for measuring and building mature CTI programs
The CTI Capability Maturity Model (CTI-CMM) is an easy to use, vendor-neutral model that promotes a “stakeholder-first” approach to building a mature CTI program, evaluating its progress, and continuously improving it during ...

Threat hunting case study: Looking for Volt Typhoon
Volt Typhoon is a state-sponsored threat actor group that establishes persistence in critical infrastructure. Here's how to perform intelligence-driven threat hunting to find possible signs of an attack.

Threat hunting case study: Looking for Evil Corp
Threat hunting can detect malicious behavior and stop a data breach. Here's how to use Intel 471's Hunter platform to detect the Evil Corp cybercriminal group.

Vulnerabilities Year-in-Review: 2023
In 2023, threat actors showed increasing interest in zero-day vulnerabilities and recently disclosed ones. Here's our review of the trends and tips for defense.

Phishing Emails Abusing QR Codes Surge
QR code phishing has surged as cybercriminals revisit this old technique. Here are the trends and how to guard against these kinds of attacks.

Detecting and Stopping Malicious Traffic
A cornerstone of security operations is detecting malicious traffic. Here's how we collect high-fidelity indicators of compromise from threat actors that can be routed to firewalls, EDR and SIEM solutions to prevent brea...