Threat Hunting Foundations Workshop: Moving Beyond IOCs to Behaviors and TTPs
This workshop builds a strong threat-hunting foundation by focusing on adversary behaviors and TTPs instead of IOCs. Unlike our other sessions, it emphasizes core models, frameworks, and structured methodologies to develop a systematic approach to hunting threats.
Decoding the Ransomware Playbook: Threat Hunting Opportunities to Thwart Bassterlord’s Techniques
Join Intel 471 for our webinar “Decoding the Ransomware Playbook: Threat Hunting Opportunities to Thwart Bassterlord’s Techniques” to discover how your teams can use intelligence-driven threat hunting to identify and stop top-tier ransomware threats early in the attack lifecycle — before adversaries deploy ransomware or exfiltrate data.
Top Cover 4 – Threat Hunting Management Workshop: Hiring Effective Threat Hunters
Intel 471's Top Cover workshop invites you to this session on hiring threat hunters, where we’ll explore strategies for building and managing a high-performing team.
NIS2: Achieving Digital Resilience Within Europe's Critical Sectors
This is a must-see webinar for all entities in scope of NIS2. Hosted by Intel 471 content manager Liam Tung, you’ll hear Dekker’s insights on how ENISA and the EU will help improve cybersecurity, resilience, and preparedness for today’s evolving threat environment.
Threat Hunting Workshop 14: Hunting for Initial Access - Level 2
Intel 471 is excited to introduce the first in our new Level 2 Threat Hunting Workshop series, designed for those ready to take on greater challenges. This inaugural session focuses on Initial Access, offering progressive threat hunting training that provides a deeper and more rigorous exploration of this tactic.

Lifting the Covers on RansomHub's Rise
RansomHub is now the top Ransomware-as-a-Service (RaaS) affiliate program since it hit the ransomware scene in February 2024. RansomHub claimed responsibility for 15% of over 1,000 ransomware breaches that Intel 471 tracked in Q3 2024.

U.S. Elections 2024: What To Do About Pink Slime Overtaking Local News?
So-called “pink slime” news sites are filling an information void left by a U.S. local news industry in rapid decline. What can be done to control the integrity of online news in this environment? And how much of a threat to democracy is pink slime journalism in an election year?

Threat Hunting Workshop 13: Hunting for Discovery - Level 1
Our workshop will unpack the intricacies of the Discovery tactic, exploring the methods adversaries use to identify sensitive information and map out environments. We'll dive into the most prevalent techniques adversaries employ for Discovery and, most importantly, show how to detect and counter these maneuvers in your environment.

Guests Check-in, Cybercriminals Cash-out: Protecting Payment Data from Phishing Attacks
In this webinar, you’ll learn how one cybercrime and fraud operation is targeting hotel guest payment card data in hotel booking systems. They’re not just abusing Booking.com’s brand in phishing emails, but using compromised hotel partner Booking.com accounts to send messages to guests in the official Booking.com app and emails requesting “mandatory payment” before their upcoming stay.

Threat Hunting Workshop 12: Hunting for Collection - Level 1
With Intel 471’s powerful in-depth cyber threat intelligence and HUNTER Platform, we will demonstrate how to effectively transition from intelligence to precise, operationalized threat hunting for collection.