Blog: Stay Ahead of Cyber Threats | Intel 471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Hero background fallback
Threat hunting case study: PsExec
Threat Hunting// Jan 21, 2025

Threat hunting case study: PsExec

PsExec, a command-line utility used for remotely managing Windows computers, is often abused by threat actors. Here's how to threat hunt for suspicious PsExec activity.

Bring Your Own Hunts to HUNTER471
Threat Hunting// Dec 18, 2024

Bring Your Own Hunts to HUNTER471

As a HUNTER471 customer utilizing the Hunt Management Module (HMM), you can now “bring your own” (BYO) threat hunting content to the HUNTER471 threat hunting platform.

Threat Hunting Case Study: Uncovering Turla
Threat Hunting// Nov 11, 2024

Threat Hunting Case Study: Uncovering Turla

Adversaries try to hide malicious components by renaming them as legitimate Windows binaries. This technique has been used by the Turla threat actor group and others. Here's how to threat hunt for this behavior.

Threat Hunting Case Study: Tracking Down GootLoader
Threat Hunting// Aug 20, 2024

Threat Hunting Case Study: Tracking Down GootLoader

GootLoader is malware used to gain initial access to computers for exploitation by threats such as ransomware. In this case study, we describe how to use the HUNTER platform to threat hunt GootLoader infections.

Threat-Informed Defense through Behavioral Threat Hunting
Threat Hunting// Mar 13, 2024

Threat-Informed Defense through Behavioral Threat Hunting

Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024
Threat Hunting// Jan 17, 2024

Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024

The Imperative Role of Threat Hunting in Exposure Management
Threat Hunting// Dec 14, 2023

The Imperative Role of Threat Hunting in Exposure Management

Prioritization in Cybersecurity: Navigating the Content Revolution
Threat Hunting// Dec 06, 2023

Prioritization in Cybersecurity: Navigating the Content Revolution

Balancing Act: How AI/ML Can Both Aid and Obstruct Threat Hunting
Threat Hunting// Dec 05, 2023

Balancing Act: How AI/ML Can Both Aid and Obstruct Threat Hunting

Proactively Threat Hunting in the Cloud: Why It's Essential
Threat Hunting// Oct 16, 2023

Proactively Threat Hunting in the Cloud: Why It's Essential

Featured Resource
Intel 471 Logo 2024

AresLoader is a new loader malware-as-a-service (MaaS) offered by threat actors with links to Russian hacktivism that was spotted recently in the wild.