Blog: Stay Ahead of Cyber Threats | Intel 471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Homepage Hero
A Look at Trending Chinese APT Techniques
Cybercriminals// Malicious Actors// Nov 18, 2024

A Look at Trending Chinese APT Techniques

Cyber capabilities play a key role in achieving China’s strategic goals. Here's a look at significant state-sponsored actors, which are adopting stealthy techniques to avoid their campaigns being linked to Beijing.

Threat Hunting Case Study: Uncovering Turla
Threat Hunting// Nov 11, 2024

Threat Hunting Case Study: Uncovering Turla

Adversaries try to hide malicious components by renaming them as legitimate Windows binaries. This technique has been used by the Turla threat actor group and others. Here's how to threat hunt for this behavior.

How to Defend Against Alleged Snowflake Attacker ‘Judische’
Cybercriminals// Malicious Actors// Nov 05, 2024

How to Defend Against Alleged Snowflake Attacker ‘Judische’

The threat actor behind the compromise of more than 165 organizations using Snowflake credentials stolen by infostealers has reportedly been detained. Here's a profile of the Com-related threat actor "Judische."

RedLine and Meta: The Story of Two Disrupted Infostealers
Cybercriminals// Malicious Actors// Oct 30, 2024

RedLine and Meta: The Story of Two Disrupted Infostealers

The RedLine infostealer's infrastructure is offline and its alleged creator charged. But RedLine's activity continues. Here's a deep dive into this infostealer operation and the effects of a law enforcement disruption.

A Halloween Story: 10 Cyber Ghouls We Eyeballed In Q3 2024
Threat Intelligence// Oct 29, 2024

A Halloween Story: 10 Cyber Ghouls We Eyeballed In Q3 2024

In the third quarter of 2024, ransomware remained one of the most impactful threats to all sectors. Defenders were faced with a record number of vulnerabilities as nation-state actors, money lusting cybercriminals, and hackti...

Elections 2024: Pink Slime Journalism Overtaking Local News?
Threat Intelligence// Oct 24, 2024

Elections 2024: Pink Slime Journalism Overtaking Local News?

“Pink slime” news sites peddling politically biased stories and misinformation are filling an information void left by a US local news industry in rapid decline. What can be done to protect consumers and the integrity of onli...

Will Processing CTI Become Legally Risky?
Threat Intelligence// Oct 22, 2024

Will Processing CTI Become Legally Risky?

In this Studio 471, Peter Swire discusses the regulatory environment, how it could impact the use of cyber threat intelligence and what could be done to ensure attackers don’t leverage these changes to their advantage.

How Adversaries Try to Interfere with the U.S. Election
Cybercriminals// Malicious Actors// Oct 14, 2024

How Adversaries Try to Interfere with the U.S. Election

Russia, China and Iran have conducted cyber and influence operations ahead of the 2024 U.S. presidential election in November. Here's a look at the tactics used in attempts to disrupt the election.

Is your organisation ready for NIS2?
Security Operations// Oct 14, 2024

Is your organisation ready for NIS2?

The October 17 deadline for EU Member States to transpose the EU’s NIS2 Directive to lift the cyber resilience of critical infrastructure across Europe is here. NIS2 and the rapidly evolving digital threat landscape make it m...

To Deliver Malware, Attackers Use the Phone
Cyber Attacks// Oct 08, 2024

To Deliver Malware, Attackers Use the Phone

Underground call center services are aiding threat actors in delivering malware through callback phishing and negotiating ransoms. Here's a briefing about different attack scenarios and tips for defense.