CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  983 articles  ·  updated every 4 hours · grows forever

983Total
940Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day

January 2026 saw 23 actively exploited CVEs, including APT28’s Microsoft Office zero-day and critical auth bypass flaws impacting enterprise systems.

Recorded Future Read →
◉ Threat Intelligence
Preparing for Russia’s New Generation Warfare in Europe

Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read the full report to understand what New Gen…

Recorded Future Read →
◉ Threat Intelligence
2025 Cloud Threat Hunting and Defense Landscape

Threat actors are doubling down on cloud infrastructure — exploiting misconfigurations, abusing native services, and pivoting through hybrid environments to maximize impact. See how attack patterns ar…

Recorded Future Read →
◉ Threat Intelligence
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and Sectop…

Recorded Future Read →
◉ Threat Intelligence
Network Intelligence: Your Questions, Global Answers

Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.

Recorded Future Read →
◉ Threat Intelligence
State of Security Report | Recorded Future

Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored operations, ransomware evolution, and emerging …

Recorded Future Read →
◉ Threat Intelligence
European Space Agency Confirms Cybersecurity Incident - The Cyber Express

European Space Agency Confirms Cybersecurity Incident The Cyber Express

The Cyber Express Read →
◉ Threat Intelligence
Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026

The global threat landscape didn't simplify in 2025 — it shattered. The 2026 State of Security report represents Insikt Group's most comprehensive threat intelligence analysis to date, drawing on prop…

Recorded Future Read →
◉ Threat Intelligence
From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations

Discover how Autonomous Threat Operations reduces 27 manual steps to as few as 5 largely automated ones, delivering the speed, scale, and effectiveness that the modern threat landscape demands.

Recorded Future Read →
◉ Threat Intelligence
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation

Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.

Recorded Future Read →
◉ Threat Intelligence
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future

This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate its real-world impact before releasing it to…

Recorded Future Read →
◉ Threat Intelligence
Check Point Software confirms security incident but pushes back on threat actor claims - Cybersecurity Dive

Check Point Software confirms security incident but pushes back on threat actor claims Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence
PurpleBravo’s Targeting of the IT Software Supply Chain

Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.

Recorded Future Read →
◉ Threat Intelligence
Threat and Vulnerability Management in 2026

Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.

Recorded Future Read →
◉ Threat Intelligence
How AI has become an enabler and a threat actor in cybersecurity - CRN Australia

How AI has become an enabler and a threat actor in cybersecurity CRN Australia

CRN Australia Read →
◉ Threat Intelligence
Best Ransomware Detection Tools

Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.

Recorded Future Read →
◉ Threat Intelligence
December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity

December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.

Recorded Future Read →
◉ Threat Intelligence
Practitioners Reveal What Makes Threat Intelligence Programs Mature

Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business value. Learn proven approaches to automatio…

Recorded Future Read →
◉ Threat Intelligence
GRU-Linked BlueDelta Evolves Credential Harvesting

Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.

Recorded Future Read →
◉ Threat Intelligence
New ransomware tactics to watch out for in 2026

Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation. Learn the emerging trends def…

Recorded Future Read →
◉ Threat Intelligence
Digital Threat Detection Tools & Best Practices

Explore digital threat detection tools and learn best practices to identify, analyze, and neutralize digital threats before they impact your business.

Recorded Future Read →
◉ Threat Intelligence
BlueDelta’s Persistent Campaign Against UKR.NET

Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.

Recorded Future Read →
◉ Threat Intelligence
China’s Zero-Day Pipeline: From Discovery to Deployment

China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.

Recorded Future Read →
◉ Threat Intelligence
The $0 Transaction That Signaled a Nation-State Cyberattack

A $0 card test signaled a Chinese state-linked cyberattack on Anthropic’s AI platform. Learn how card-testing fraud intelligence spots nation-state ops early.

Recorded Future Read →
← Prev 32 / 41 Next →