Heute sitzen CISOs am Management-Tisch
Brandon Hoffman ist Chief Strategy Officer der Security-Firma Intel 471. Im Interview spricht er über Veränderungen in der Cyberabwehr, die Wichtigkeit von Threat Hunting und die Bedrohungslage in der Schweiz.
How to threat hunt Living Off The Land binaries
In this Help Net Security video, Lee Archinal, Senior Threat Hunter at Intel 471, walks through practical strategies for detecting malicious activity involving Living Off The Land binaries (LOLBins).
Fingerprinting threat actors by their anonymity techniques
Cybersecurity consultant Mick Deben of DMC Group created a knowledge base of attacker anonymity techniques. In this Studio 471 podcast, he discusses how practitioners can use it to fingerprint threat actors.
Threat Hunting Management Workshop: Structuring Collaboration Across Teams
Discover how better coordination across teams can increase the impact of your threat hunting program. Register now for our June 18 workshop and earn your Cross-Team Collaboration certificate.
US takes down DanaBot botnet used in global hacks and fraud
The DanaBot group, which US officials say is based in Russia, is accused of using DanaBot to steal data, commit fraud, and help spread ransomware around the world.
Risky Bulletin: SVG use for phishing explodes in 2025
Over the course of the past six months, the SVG image format has become a favorite method of hiding and delivering malicious code for email phishing campaigns. Intel 471 looks at the structure of the DanaBot botnet, which was dismantled by authorities last week.
U.S. Authorities Seize DanaBot Malware Operation, Indict 16
Law enforcement in the United States and Europe this week disrupted the infrastructure of the long-running DanaBot malware-as-a-service (MaaS) operation that authorities said infected more than 300,000 systems and caused more than $50 million in damages.
Operation Endgame Takes Down DanaBot Malware, Neutralizes 300 Servers
In a major international operation coordinated by Europol and Eurojust, law enforcement agencies and private sector partners have successfully dismantled the DanaBot malware network.
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization.
Law Enforcement Busts Initial Access Malware Used to Launch Ransomware
US authorities have issued charges against a number of individuals suspected of involvement in developing and deploying the QakBot and DanaBot malware, respectively. The US highlighted the role of Amazon, Crowdstrike, ESET, Flashpoint, Google, Intel 471, Lumen, PayPal, Proofpoint, Spycloud, Team CYMRU and ZScaler in the DanaBot investigation.
DanaBot malware disrupted, threat actors named
The DanaBot malware was severely disrupted by law enforcement. Here's an in-depth look at this data-stealing workhorse for the cybercriminal underground.
DanaBot malware operation seized in global takedown
The successful break-up of DanaBot marks the second high-profile law enforcement disruption of a widespread malware operation in as many days.