Behavioral Threat Hunting
Behavioral threat hunting uses security event data to identify patterns of behavior based on adversary intelligence that reveal a specific actor’s tactics, techniques, and procedures (TTPs) inside an environment. By studying how specific threat actors have used tools, systems, and software to achieve their goals, threat hunters can identify expected behaviors within the “cyber kill chain” that indicate network pivoting, expansion or exfiltration.
The Hunt Management Module
Threat hunt teams need tooling to manage hunt processes and ensure that hunt outcomes drive proactive security operations. The Hunt Management Module guides the management of hunts, including research, testing, results, and reporting, helping teams develop consistent, rigorous, and repeatable processes that improve the organization’s security posture, controls, and policies.
Cyber Geopolitical Intelligence
Cyber Geopolitical Intelligence from Intel 471 provides a unique lens to organizational leaders about shifting regional alliances, trade disputes, territorial conflicts and diplomatic crises that we believe will impact the cyber threat landscape.
Marketplace Intelligence
Intel 471 Marketplace Intelligence offers insights into the most important and active underground marketplaces.
Adversary Intelligence
Intel 471's Adversary Intelligence provides proactive and groundbreaking insights into the methodology of top-tier cybercriminals.

Malware Intelligence
Intel 471 Malware Intelligence allows you to actively track weaponized and productionized threats.

Vulnerability Intelligence
Intel 471’s Vulnerability Intelligence provides both relevant and timely intelligence information about the adversary.