RSA Conference 2025 Announcements Summary (Day 1)
Intel 471 announced enhancements to its HUNTER platform, including Bring Your Own Hunts, a feature that allows threat hunters to map hunt queries to tried-and-tested methodology for managing investigations and measuring hunt performance metrics, and Guided Threat Hunts, which helps security teams hunt advanced adversary behaviors with greater speed, decisiveness and consistency.
2025 SC Awards Finalists: Innovator (Executive or Practitioner) of the Year
Cybersecurity innovation depends heavily on visionary leadership and technical excellence. This year's finalists are notable for pushing boundaries, adopting unconventional approaches, and significantly enhancing cybersecurity practices.
AI Powered Phishing Kits: The New Frontier in Social Engineering
Over the past few weeks, security researchers from Intel 471 and Proofpoint have uncovered a disturbing trend: AI-powered phishing kits are now being sold openly on Telegram, many of them boasting integrations with ChatGPT-style language models and LinkedIn scraping capabilities.
How Threat Actors Leverage Remote Monitoring and Management Software
Jeremy Kirk, the Executive Editor for Cyber Threat Intelligence at Intel 471, explains how threat actors can leverage remote monitoring and management (RMM) software solutions. This article originally appeared in Insight Jam, an enterprise IT community that enables human conversation on AI.
Why global tensions are a cybersecurity problem for every business
With global tensions climbing, cyber attacks linked to nation-states and their allies are becoming more common, sophisticated, and destructive. For organizations, cybersecurity can’t be treated as separate from world events anymore, they’re closely connected.

Sam’s Club investigating attack claim linked to Clop ransomware
Sam’s Club confirmed it is investigating a possible cyberattack after the retailer was referenced on a leak site by the prolific Clop ransomware gang.

Ransomware Attacks a Decade In: What Changed? What Didn’t?
2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them.

Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel
A significant leak of internal chat logs from the Black Basta ransomware group has provided cybersecurity researchers with unprecedented insight into their operations, capabilities, and motivations.

Risky Bulletin: nRootTag turns any Bluetooth device into an AirTag
A team of academics has found a way to remotely turn any Bluetooth-capable device into an AirTag tracker. The technique is named nRootTag and abuses how Apple's FindMy network indexes AirTags and searches for tracked or lost devices.

TgToxic malware evolves with advanced anti-detection techniques
Cybersecurity researchers have identified a new variant of the TgToxic Android malware, also known as ToxicPanda, which highlighted its evolving threat as attackers use public reporting to their advantage, according to The Hacker News.