CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Threat Intelligence
Intel Feed

cyberintel.kalymoon.com  ·  983 articles  ·  updated every 4 hours · grows forever

983Total
940Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◉ Threat Intelligence
White Paper Preview: Black "Fraud Day” and Beyond — The Key Cyber Threats Facing the Retail Sector this Holiday Season

Black Friday kicks off retailers’ most profitable season—and also a peak period for cybercriminals, who exploit the surge in online shopping and payment activity.

Intel 471 Read →
◉ Threat Intelligence
Threat hunting case study: Detecting IAB activity

Initial access brokers sell information about or access to compromised computers. Here's how to threat hunt for a known attack behavior involving PowerShell that's used by a prolific initial access br…

Intel 471 Read →
◉ Threat Intelligence
Using deception to extract cyber threat intelligence

Tim Pappa is a former FBI supervisory special agent who specializes in deception techniques. In this Studio 471, he discusses what threat intelligence can be gained using deception and how organizatio…

Intel 471 Read →
◉ Threat Intelligence
Lynx Ransomware

Lynx Ransomware is rapidly expanding, targeting organizations across North America and Europe with data theft and double extortion, backed by a growing network of skilled affiliates.

Intel 471 Read →
◉ Threat Intelligence
Qilin Ransomware Group

Qilin Ransomware Group is a rapidly evolving RaaS operation that first became widely visible in mid-2022 and has since escalated its attacks in both volume and sophistication.

Intel 471 Read →
◉ Threat Intelligence
ClickFix: Tricking users into installing infostealers

Malware distribution campaigns that trick people into copying and pasting malicious commands, known as ClickFix, have been wildly successful. Here's an examination of ClickFix and how to defend agains…

Intel 471 Read →
◉ Threat Intelligence
Cybercrime Takedowns: Trust, Partnerships and Focus

Intel 471’s Public Sector team is regularly called upon to provide cyber investigation support, threat insights and real-life attribution in support of global law enforcement operations.

Intel 471 Read →
◉ Threat Intelligence
How card fraud is powered by underground card checkers

Payment card "checkers" are used by criminal hackers to check the validity of stolen payment card details. Here's how this in-demand underground service works.

Intel 471 Read →
◉ Threat Intelligence
Tracking down The Com

In this Studio 471, Michael Fletcher, a former Cybercrime Technical Analyst with the Australian Federal Police, describes the origin of The Com and how threat actors in this sphere pose a threat.

Intel 471 Read →
◉ Threat Intelligence
Turning Chaos into Clarity: The Next Phase of Intel 471’s Geopolitical Intelligence Solution

Discover how the next phase of Intel 471’s Geopolitical Intelligence solution protects your organization against both physical and cyber threats arising from shifting global dynamics.

Intel 471 Read →
◉ Threat Intelligence
The FBI’s Group 78: Covertly fighting ransomware?

European law enforcement officials say a secret U.S. FBI task force called Group 78 used covert tactics to disrupt the Black Basta ransomware group, but it has caused tension. Intel 471 analyzes the d…

Intel 471 Read →
◉ Threat Intelligence
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure

Summary Note: This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Re…

CISA Alerts Read →
◉ Threat Intelligence
CISA Shares Lessons Learned from an Incident Response Engagement

Advisory at a Glance Executive Summary CISA began incident response efforts at a U.S. federal civilian executive branch (FCEB) agency following the detection of potential malicious activity identified…

CISA Alerts Read →
◉ Threat Intelligence
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System

Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, l…

CISA Alerts Read →
◉ Threat Intelligence
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

Summary The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement.…

CISA Alerts Read →
◉ Threat Intelligence
#StopRansomware: Interlock

Summary Note : This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat …

CISA Alerts Read →
◉ Threat Intelligence
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider

Summary The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote M…

CISA Alerts Read →
◉ Threat Intelligence
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

Summary The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and proced…

CISA Alerts Read →
◉ Threat Intelligence
Russian GRU Targeting Western Logistics Entities and Technology Companies

Executive Summary This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involve…

CISA Alerts Read →
◉ Threat Intelligence
Fast Flux: A National Security Threat

Executive summary Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enab…

CISA Alerts Read →
◉ Threat Intelligence
#StopRansomware: Medusa Ransomware

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat act…

CISA Alerts Read →
◉ Threat Intelligence
Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026 - Dark Reading

Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026 Dark Reading

Dark Reading Read →
◉ Threat Intelligence
Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy - Cybersecurity Dive

Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy Cybersecurity Dive

Cybersecurity Dive Read →
◉ Threat Intelligence
IBM X-Force 2025 Threat Intelligence Index - IBM

IBM X-Force 2025 Threat Intelligence Index IBM

IBM Read →
← Prev 37 / 41 Next →