-
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
-
COTS vs. FOSS in Cybersecurity: Why COTS is the Smarter Choice ...
-
Inside Intelligence Center: LUNAR SPIDER Enabling Ransomware Attacks on Financial Sector with Brute Ratel C4 and Latrodectus
-
Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries
-
EclecticIQ Intelligence Center 3.4 is here
-
Streamlining Threat Intelligence with Customizable Keyword-Based Watchlists
-
Unleashing the Power of Collaboration: Extended STIX 2.1 Support with Collaborative Notes
-
Transforming Threat Intelligence with AI-Powered, Multilingual NLP Search
-
Transform Your Threat Management with Advanced MITRE ATT&CK Analysis Tools
-
Elevate Your Intelligence Reports with EclecticIQ's AI Writing Assistant
-
ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution
-
Introducing EclecticIQ Threat Scout
-
EclecticIQ Intelligence Center 3.3 is here
-
Turla APT Targets Albania With Backdooor in Ongoing Campaign to Breach European Organizations
-
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
-
WikiLoader Delivery Spikes in February 2024
-
10 Steps to Building a Comprehensive CTI Practice
-
Advanced Cybercriminals Rapidly Diversify Cyberattack Channels Following Public Vulnerability Disclosure
-
DarkGate: Opening Gates for Financially Motivated Threat Actors
-
Star Blizzard Operations Linked to Russian Intelligence Agency; APT28 Targets NATO’s Rapid Response
-
EclecticIQ Retrospective: A Look at the Themes & Events That Shaped the 2023 Cyber Landscape
-
The Rapidly Evolving Landscape of Generative AI Tools, AI-Powered Cyber Threats and AI-Centric Adversarial Tactics
-
ChatGPT Vulnerability; LockBit Cyberattack On ICBC; US Water Authority Hacked
-
Welcoming EclecticIQ Intelligence Center 3.2
-
Sandworm Targets Ukraine's Critical Infrastructure; Overlooked AI Privacy Challenges
-
Navigating Cyber Challenges: Biden's AI Executive Order, Ransomware Attack on German Municipalities
-
Cisco IOS XE Web UI Privilege Escalation Vulnerability; Sandworm Targets Ukrainian Telecom
-
Johnson Controls Ransomware Attack; McLaren Health Care Data Breach; Unpatched Exim Vulnerability; Lazarus LinkedIn Attack; NATO Cyber Breach
-
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
-
Ransomware and DDoS Feature in The Apex of Crime-as-a-Service Report
-
Qakbot Infrastructure Takedown, UNC4841 Exploits Barracuda Zero-Day
-
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang
-
Flax Typhoon targeting Taiwan, Ransomware Emphasizing Linux-Centric Payloads
-
Malware-as-a-Service: Redline Stealer Variants Demonstrate a Low-Barrier-to-Entry Threat
-
Black Bersek Malware, Large Language Model Adaption For Offensive Cyber Capabilities
-
German Embassy Lure: Likely Part of Campaign Against NATO Aligned Ministries of Foreign Affairs
-
Norwegian Cyberattack, Virustotal Data Leak and AI powered BEC
-
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
-
Spearphishing Campaign Targets Zimbra Webmail Portals of Government Organizations
-
8Base Ransomware Surge; SmugX Targeting European Governments; Russian-Linked DDoS Warning
-
Early High-Profile Cyberattacks Provide Best-Practices For Cryptocurrency Platforms Prior to Established Attack Pattens
-
New Vulnerabilities Related to Moveit; Potential Impact of Legislation on Large Language Models
-
FIN7 delivering Clop ransomware; ChatGPT and Midjourney imposter apps deliver BatLoader
-
Chinese Threat Actor Used Modified Cobalt Strike Variant to Attack Taiwanese Critical Infrastructure
-
Russian Malware Network Dismantled; Iranian Threat Actors Attack PaperCut Servers
-
Trends and Predictions of Growing Cryptocurrency Cyberattacks
-
Introducing EclecticIQ Intelligence Center 3.0
-
Creative Ransomware Extortion; Further Malware Capabilities With ChatGPT
-
Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware
-
3CX Incident Attributed to North Korea; New LockBit MacOS Sample
-
Exposed Web Panel Reveals Gamaredon Group's Automated Spear Phishing Campaigns
-
CISA Warns of Telerik Vulnerability; Kimsuky Steal Gmail Emails
-
Cybercriminals Exploit SVB’s Collapse; Emotet Returns & BatLoader Abuses Google Ads
-
Dark Pink APT Group Strikes Government Entities in South Asian Countries
-
DeFi Hack Recovers Stolen Funds; Blacklotus Bypasses Windows Secure Boot
-
Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain
-
A Year of the Russia-Ukraine War: Seven Types of Cyberattacks Used Against Ukraine
-
ESXi Ransomware Updates Counter Recovery Script; Killnet Targets Airports and Hospitals
-
Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon
-
Security Service of Ukraine and NATO Allies Potentially Targeted by Russian State-Sponsored Threat Actor
-
2023: Complexity Reigns in Cybersecurity as Existing Threats Adapt and New Technologies Emerge
-
Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware
-
ChatGPT Makes Waves Inside and Outside of the Tech Industry
-
The Godfather Banking Trojan Expands Application Targeting to Affect More Europe-Based Victims
-
QakBot Malware Bypass Windows Security Using Unpatched Vulnerability
-
Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons
-
EclecticIQ Retrospective: A Look at the Themes & Events that Shaped the 2022 Cyber Landscape
-
Escalation of Information Stealer Capabilities Targeting Valid Accounts Increases Risk Into 2023
-
Australia Seeks to Disrupt & Stop Cybercriminal Syndicates with New Task Force
-
Attack Against Tata Power Highlights Cyber Risk to India’s Growing and Increasingly Connected Population
-
New Microsoft Exchange Server Zero-Day Vulnerabilities
-
Killnet Effectively Amplifies Russian Narratives but has Limited DDoS Capabilities
-
Ukraine-Russia Conflict: Ukraine Alerts Energy Enterprises to Possible Cyberattack Escalation
-
Common Attack Patterns Still Feature in Modern Cyberattacks
-
Investigating NATO-Themed Phishing Lures With EclecticIQ Intelligence Center and Endpoint Response Tool
-
OSINT 101: An Introduction to Sock Puppets
-
U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically
-
The Analyst Prompt #16: Monero's Hard Fork Enhances Privacy and May Make It More Attractive to Cybercriminals
-
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security
-
Long Term Analysis Illustrates How Risk Posed by a Vulnerability Changes as Exploits Develop Over Time
-
The Analyst Prompt #14: Malicious Use of Internet Information Services (IIS) Extensions Likely to Grow
-
Threat Actors Merging Malicious Activity With Cryptocurrency Show How the Attack Landscape is Developing in Decentralized Finance
-
Emotet Downloader Document Uses Regsvr32 for Execution
-
Save More Analyst Time and Effort with EclecticIQ Intelligence Center 2.13
-
The Analyst Prompt #13: Zero-Day Vulnerabilities and Sophisticated Spyware Make a Case for Layered Security.
-
The Analyst Prompt #12: Harmony Blockchain Confirms Compromise and Theft of Approximately $100 Million USD
-
The Analyst Prompt #11: Exploitation of Atlassian and Microsoft's Major Vulnerability
-
The Analyst Prompt #10: AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities
-
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms
-
The Analyst Prompt #09: Longtime Threat Actor Group REvil May be Returning to the Cyber Fight
-
EclecticIQ Intelligence Center goes API-first and more with release 2.12
-
Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape
-
The Analyst Prompt #08: EclecticIQ Data Show Emotet Gained Momentum in Recent Months
-
The Analyst Prompt #07: Ukraine War Related Cyberattack Risk Increases Outside the Main Conflict And Fluid Cybercriminal Marketplaces Maintain Strong User Bases
-
Cyber Resilience and Data Confidentiality are Emerging Components of Healthcare
-
Attack Patterns Produce Growing Losses Targeting Mutual Vulnerabilities Endemic to Decentralized Finance
-
The Analyst Prompt #06: Racoon Stealer Development Hiatus, Updates on LAPSUS$ and North Korean State Backed Operations
-
The Analyst Prompt #05: Russo-Ukrainian Cyberattacks, and Updates on Lapsus$ and Conti Ransomware Operations
-
Understanding Features and Vulnerabilities of The Decentralized Finance Attack Surface is Key to Protecting Against Cyber Attacks
-
The Analyst Prompt #04: MuddyWater APT attributed to Iranian Ministry of Intelligence and Security, and the Increasing Global Ransomware Threat
-
Let's Talk: Women In Cyber
-
The Analyst Prompt #03 - SPECIAL EDITION: A Look at Cyber as a Tool of War in the Russia-Ukraine Conflict
-
The Dark Side of Web Hosting Services
-
The Analyst Prompt #02: Threat Intel for Cryptocurrency, NSO Group Rebranding, and a Distillation of Pwnkit Intel.
-
The Analyst Prompt #01: APT35 and AQUATIC PANDA Exploit the Log4j Vulnerability
-
The Analyst Prompt #42: Ransomware Attacks Not Letting Up as 2021 Draws to a Close
-
2021’s Challenges Highlight the Need for Intelligence-Based Cyber Defense
-
The Analyst Prompt #41 Insurance Costs Rise as Attackers Seek to Cash in on Cyber Insurance Payouts
-
Discover What’s New in EclecticIQ Intelligence Center 2.11
-
The Analyst Prompt #40 Ransomware; TA505; Iranian Nation State
-
The Analyst Prompt #39 Ransomware; Falsified Covid Certificates; US Blacklists NSO Group
-
Countering the Ransomware Threat When There Is No Silver Bullet
-
What does it mean to “Put Cybersecurity First?"
-
The Analyst Prompt #38 Fake Media; Regional Ransomware Cooperation Framework
-
What Does It Mean to Work in Cybersecurity?
-
What does it mean to “Phight the Phish?”
-
Growth of Online Conspiracy Narratives in the Netherlands Presents Regulatory Challenges
-
The Analyst Prompt #37 Cryptocurrency Regulations; Dutch Info Sharing; New MS Vulnerability
-
What's It Mean to Be Cyber Smart?
-
The Analyst Prompt #36 AUKUS; TeamTNT; Microsoft Exploit
-
Ransomware: Hope for the Best, Prepare for the Worst
-
The Analyst Prompt #35 - Ragnarok Phorpiex ;US Cyber Cooperation; Cryptocurrency Heists
-
A Look into Banking Trojan IcedID’s Installation Process
-
Welcome aboard to the European Investment Bank and TIIN Capital
-
Recent Events Highlight Threat Actors' Complex Relationships Alongside New Risks at the Fore of the Financial Industry
-
Malware Marketplaces Provide Newcomers with Expanded Capability
-
REvil and Darkside Successor Launches Operations as United States Establishes Joint Cyber Defense Collaborative
-
Recent Articles Highlight Threat Actors’ Propensity for Focused Targeting of Different Victim Groups
-
An Accelerating Ransomware Threat Needs a Strong Cyber Defense
-
It’s Official: STIX & TAXII 2.1 Are Here!
-
Ransom Demands Hit a New Monetary Milestone
-
Kaseya-MSP Clients Remain at Very High Risk of Further Targeted Attacks
-
Escalating Attacks Stretch Across Nations and Industries
-
EclecticIQ Intelligence Center 2.10 Adds More STIX 2.1 Support, Built-In MITRE ATT&CK, Knowledge Packs
-
Introducing Our New Platform and Our Intelligence at the Core Philosophy
-
Threat Actors Continually Expand and Evolve Tools, Techniques, and Associations with Other Groups
-
Rapid TTP Development and Syndicate Adoption Ignite Q2 Ransomware Explosion
-
Ransomware Is Everywhere, It Seems
-
The Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
-
Phishing Emails Impersonate Maritime Industry in Likely BEC Campaign
-
Credentials and Cryptocurrency Are Targets of Recent Exploits
-
Attacks Target Multiple Industry Sectors, from Freight to Food and Medical
-
BEYOND THE IOC-Moving from the “what” to the “how” to better stay ahead of emerging attacks
-
Ransomware Evolves with New Tools and Collaborations
-
Multiple APT Groups Exploit Exchange Server Vulnerabilities
-
Microsoft Under Pressure from Zero Day Vulnerabilities and SolarWinds Targeting
-
Ransomware Groups Turn Up the Heat by Adding DDoS Attacks
-
Threat actors leverage Microsoft RDP service and RTF files
-
Attacks Target Healthcare Sector, Including COVID-19 Vaccine Research
-
EclecticIQ Monthly Vulnerability Trend Report - December 2020
-
Compromise of SolarWinds Software Has Huge Global Impact
-
QAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital Infrastructure
-
Platform 2.9 is out!
-
APT Targets COVID-19 Vaccine Supply Chain and Vulnerability in Cisco Security
-
Prevention is better than cure in Cybersecurity
-
EclecticIQ Monthly Vulnerability Trend Report - November 2020
-
Our Series-C investment expands our horizon: what can you expect?
-
Cobalt Strike Leak, Oracle Vulnerability & Maze Shutdown
-
Probable Increase in Digital Card Skimming During Shopping Holidays
-
Forecasting: All for One and One for All in Cybersecurity.
-
Ten Years Later, EclecticIQ Examines Evolution of Stuxnet-like Attacks
-
EclecticIQ Monthly Vulnerability Trend Report - October 2020
-
EclecticIQ Monthly Vulnerability Trend Report - September 2020
-
EclecticIQ Monthly Vulnerability Trend Report - August 2020
-
Getting the Most Out of Threat Intelligence Ingestion
-
EclecticIQ Monthly Vulnerability Trend Report - July 2020
-
Ingest Threat Data Faster Than Ever Before with Platform 2.8
-
CTI Investigation into COVID-19 Contact Tracing Apps
-
EclecticIQ Monthly Vulnerability Trend Report - June 2020
-
Narrator: Generating Intelligence Reports from Structured Data
-
EclecticIQ Monthly Vulnerability Trend Report - May 2020
-
Evolving from Incident Response to Threat Intelligence
-
Re-imaging threat detection, hunting and response with CTI
-
EclecticIQ Monthly Vulnerability Trend Report - April 2020
-
WannaCry 3 Years Later, Could it Happen Again?
-
Evolving Ransomware Threat in the Energy Sector
-
EclecticIQ Monthly Vulnerability Trend Report - March 2020
-
EclecticIQ Platform 2.7 is here
-
EclecticIQ Monthly Vulnerability Trend Report - February 2020
-
How to prepare your IT operations for a WFH strategy
-
Investigating Phishing Attacks Exploiting Coronavirus Themes
-
EclecticIQ Monthly Vulnerability Trend Report - January 2020
-
Kubernetes: How to scale for success
-
2019 CTI Trends and 2020 Predictions
-
EclecticIQ Monthly Vulnerability Trend Report - November 2019
-
EclecticIQ Platform 2.6 for increased analyst productivity
-
The DNA of CTI - Fusion Center reaches 100 million entities milestone
-
EclecticIQ Monthly Vulnerability Trend Report - October 2019
-
Revisiting the question 'Why IOCs are not enough?'
-
EclecticIQ Monthly Vulnerability Trend Report - September 2019
-
What's new under the hood of EclecticIQ Platform 2.5?
-
The Ransomware Evolution Landscape Part 3 – The New Age of Ransomware and the ‘Triple Threat’
-
The Ransomware Evolution Landscape Part 2 – GandCrab, Sodinokibi and How to Scam a RaaS Operator
-
EclecticIQ Monthly Vulnerability Trend Report - August 2019
-
The Ransomware Evolution Landscape Part 1 – The Rise of the Biggest Cyberthreat
-
EclecticIQ Monthly Vulnerability Trend Report - July 2019
-
2020 Tokyo Summer Olympics From a CTI Perspective
-
EclecticIQ Monthly Vulnerability Trend Report - June 2019
-
It's All in the Name: A Guide to STIX Naming Conventions
-
Known Knowns, Unknown Unknowns and Known Unknowns in the World of CTI