Banking and Securities Industry Threat Review
This report explores the top five threats to the banking and securities industry across 2023 to empower organizations with the knowledge they need to navigate the complex cyber threat landscape.
The Four Phases of Information Stealing Malware
This report covers a variety of distribution methods used by information stealers, including specialized installation services, malicious advertising (malvertising), search engine optimization (SEO) poisoning, and malicious spam (malspam).
Unmasking Threats Impacting the Aerospace and Defense Industry
This report provides an overview of critical threats impacting the Aerospace and Defense landscape and analyzes common attack vectors and tactics, techniques, and procedures (TTPs) utilized by threat actors targeting these industries.
Cyber Threat Health Check Report
Malicious cybercriminals frequently target the pharmaceutical, biotechnology, and life sciences sectors. Companies in these sectors must remain vigilant and take the necessary measures to protect their valuable assets.
Leverage CTI to Mitigate Supply Chain Risk
This whitepaper provides an understanding of the who, what, and why behind supply chain attacks, empowering organizations to avoid these incidents in the future.
The Underground Carding Market
Payment card fraud remains a significant threat in the underground marketplace. Intel 471 details threats such as social engineering, information-stealer malware, and compromised databases that assist in perpetuating the threat from the carding market.
Bulletproof Hosting Landscape: Status Update on Actor yalishanda
Intel 471 has been actively tracking Bulletproof Hosting (BPH) services and the threat actors behind them. One threat actor notably continues to provide one of the most popular malicious infrastructure services: yalishanda.
Mobile Malware Underground Perspective
This report discusses how mobile malware impacts Android devices from the perspective of cybercriminals and financially motivated threat actors. Get a deeper understanding of mobile malware attacks by downloading our whitepaper.
Gaining the Advantage with Covert Cyber HUMINT
Delve deep into the world of Cyber Human Intelligence (HUMINT) — where traditional human intelligence meets the digital world. Discover the strengths, challenges, and best practices to arm your organization with advanced, holistic defense strategies.
The 471 Cyber Threat Report 2023
This report analyzes the key trends that are gaining or losing momentum and predicts how they will shape cybercrime and the cyber underground in the coming year.