Blog: Stay Ahead of Cyber Threats | Intel471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Homepage Hero
document.getElementById('shared-search-bar').focus());">
MacOS is Increasingly Targeted by Threat Actors
Cybercriminals// Malicious Actors// Aug 12, 2024

MacOS is Increasingly Targeted by Threat Actors

Malware targeting macOS is on the rise, a result of increasing threat actor interest and more organizations using Apple products.

Threat Actors Target Gift Card Issuing Systems
Cybercriminals// Malicious Actors// Aug 06, 2024

Threat Actors Target Gift Card Issuing Systems

ATLAS LION is a threat actor group that uses phishing to gain access to gift-card issuing systems and then generates fraudulent cards.

Introducing the CTI Capability Maturity Model, a resource for measuring and building mature CTI programs
Security Operations// Aug 05, 2024

Introducing the CTI Capability Maturity Model, a resource for measuring and building mature CTI programs

The CTI Capability Maturity Model (CTI-CMM) is an easy to use, vendor-neutral model that promotes a “stakeholder-first” approach to building a mature CTI program, evaluating its progress, and continuously improving it during ...

BlankBot - a new Android banking trojan with screen recording, keylogging and remote control capabilities
Threat Intelligence// Aug 01, 2024

BlankBot - a new Android banking trojan with screen recording, keylogging and remote control capabilities

On July 24, 2024, Intel 471 Malware Intelligence researchers discovered malicious Android samples that impersonated utility applications which could not be attributed to any known existing malware family.

How Cyber Insurance is Reducing Risk
Threat Intelligence// Jul 31, 2024

How Cyber Insurance is Reducing Risk

In this Studio 471, Sezaneh Seymour, a vice president and head of regulatory risk and policy at Coalition, discusses how this approach is helping to reduce risk and incidents.

Intel 471 Cyber Geopolitical Intelligence: Making the connection between geopolitics and cybersecurity threats
Threat Intelligence// Jul 31, 2024

Intel 471 Cyber Geopolitical Intelligence: Making the connection between geopolitics and cybersecurity threats

With Intel 471 Cyber Geopolitical Intelligence, government and organizational leaders can today begin incorporating geopolitical events into their cyber risk management and incident response plans to improve their decisions a...

Threat Hunting Case Study: Looking for Volt Typhoon
Security Operations// Jul 22, 2024

Threat Hunting Case Study: Looking for Volt Typhoon

Volt Typhoon is a state-sponsored threat actor group that establishes persistence in critical infrastructure. Here's how to perform intelligence-driven threat hunting to find possible signs of an attack.

BreachForums Saga Continues. What’s Next?
Cybercriminals// Malicious Actors// Jul 18, 2024

BreachForums Saga Continues. What’s Next?

BreachForums, an infamous cybercriminal forum, is back in action after authorities disrupted it. Here's a look at the forum, including why it's back online and what may lie ahead.

Cyber Threat Landscape: 2024 Paris Olympic Games
Threat Intelligence// Jul 15, 2024

Cyber Threat Landscape: 2024 Paris Olympic Games

The infrastructure behind the 2024 Summer Olympics is vast, providing a large potential attack surface. Here's an overview of the threat landscape.

Assessing the Disruptions of Ransomware Gangs
Threat Intelligence// Jul 01, 2024

Assessing the Disruptions of Ransomware Gangs

Countering ransomware remains one of the top priorities for nations. In this post, we analyze the effects of disruptions against several high-profile ransomware groups.