Search for | Intel 471 Search Results | Intel 471 Skip to content

Search Results

Webinars hero
Showing 1-12 of 1186 results.
News

Meet Emma…HR Disruptor and Club member!

As VP of HR, Emma Denning leads a team that balances strategy with agility, ensuring a globally dispersed, remote workforce stays connected, engaged, and empowered. From replacing policies with light touch principles to championing trust and accountability, Emma is helping shape an HR function that truly supports both people and performance. In this spotlight, Emma shares her insights on what it takes to build an agile, people-first HR function that truly makes a difference.

Human Resources Today
Blog Article

Managing a cyber crisis

Cyber incidents pose not only technical challenges but communications challenges. Tom Bolitho of FTI Consulting shares guidance on successful strategies to manage complex stakeholder demands and minimize reputational damage.

Webinar

Threat Hunting: Inmersión en Malware

Descubre cómo potenciar tu programa de CTI y mejorar tus defensas partiendo desde IOCs a implementar threat-hunting basado en comportamiento. Únete a Jorge Rodríguez, director de malware research en Intel 471 en nuestro siguiente webinar el 30 de abril.

News

RSA Conference 2025 Announcements Summary (Day 1)

Intel 471 announced enhancements to its HUNTER platform, including Bring Your Own Hunts, a feature that allows threat hunters to map hunt queries to tried-and-tested methodology for managing investigations and measuring hunt performance metrics, and Guided Threat Hunts, which helps security teams hunt advanced adversary behaviors with greater speed, decisiveness and consistency.

Security Week
Blog Article

LabHost: A defunct but potent phishing service

The administrator of LabHost, a phishing-as-a-service (PhaaS) offering, was sentenced to 8 1/2 years in prison. Here's why PhaaS services are making it more difficult for defenders to prevent account takeovers and fraud.

Webinar

Threat Hunting Workshop 15: Hunting for Execution - Level 2

Sharpen your ability to detect malicious execution activity through hands-on threat hunting and intelligence-led analysis.

Blog Article

Understanding and threat hunting for RMM software misuse

Remote monitoring and management software is useful for administrators and threat actors, who often abuse or install it. Here's a briefing on RMM platform misuse and guidance for how to threat hunt for misbehavior.

Blog Article

Threat-hunting case study: Windows Management Instrumentation abuse

Attackers often use Windows Management Instrumentation (WMI) for reconnaissance to map networks. This case study describes how to threat hunt for malicious use of WMI, which is also used legitimately by administrators.

News

AI Powered Phishing Kits: The New Frontier in Social Engineering

Over the past few weeks, security researchers from Intel 471 and Proofpoint have uncovered a disturbing trend: AI-powered phishing kits are now being sold openly on Telegram, many of them boasting integrations with ChatGPT-style language models and LinkedIn scraping capabilities.

Security Boulevard
News

2025 SC Awards Finalists: Innovator (Executive or Practitioner) of the Year

Cybersecurity innovation depends heavily on visionary leadership and technical excellence. This year's finalists are notable for pushing boundaries, adopting unconventional approaches, and significantly enhancing cybersecurity practices.

SC Media
Results per page:
1 2 3 4 5 6 7
Featured Resource
Intel 471 Logo 2024

AresLoader is a new loader malware-as-a-service (MaaS) offered by threat actors with links to Russian hacktivism that was spotted recently in the wild.