-
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
-
8Base Ransomware Surge; SmugX Targeting European Governments; Russian-Linked DDoS Warning
-
New Vulnerabilities Related to Moveit; Potential Impact of Legislation on Large Language Models
-
Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain
-
ChatGPT Makes Waves Inside and Outside of the Tech Industry
-
Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons
-
EclecticIQ Retrospective: A Look at the Themes & Events that Shaped the 2022 Cyber Landscape
-
New Microsoft Exchange Server Zero-Day Vulnerabilities
-
Common Attack Patterns Still Feature in Modern Cyberattacks
-
Investigating NATO-Themed Phishing Lures With EclecticIQ Intelligence Center and Endpoint Response Tool
-
U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically
-
The Analyst Prompt #16: Monero's Hard Fork Enhances Privacy and May Make It More Attractive to Cybercriminals
-
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms
-
Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape
-
Cyber Resilience and Data Confidentiality are Emerging Components of Healthcare
-
Attack Patterns Produce Growing Losses Targeting Mutual Vulnerabilities Endemic to Decentralized Finance
-
The Analyst Prompt #05: Russo-Ukrainian Cyberattacks, and Updates on Lapsus$ and Conti Ransomware Operations
-
Understanding Features and Vulnerabilities of The Decentralized Finance Attack Surface is Key to Protecting Against Cyber Attacks
-
The Analyst Prompt #04: MuddyWater APT attributed to Iranian Ministry of Intelligence and Security, and the Increasing Global Ransomware Threat
-
The Analyst Prompt #41 Insurance Costs Rise as Attackers Seek to Cash in on Cyber Insurance Payouts
-
What does it mean to “Put Cybersecurity First?"
-
What Does It Mean to Work in Cybersecurity?
-
What does it mean to “Phight the Phish?”
-
The Analyst Prompt #37 Cryptocurrency Regulations; Dutch Info Sharing; New MS Vulnerability
-
The Analyst Prompt #36 AUKUS; TeamTNT; Microsoft Exploit
-
The Analyst Prompt #35 - Ragnarok Phorpiex ;US Cyber Cooperation; Cryptocurrency Heists
-
Welcome aboard to the European Investment Bank and TIIN Capital
-
Recent Events Highlight Threat Actors' Complex Relationships Alongside New Risks at the Fore of the Financial Industry
-
Recent Articles Highlight Threat Actors’ Propensity for Focused Targeting of Different Victim Groups
-
An Accelerating Ransomware Threat Needs a Strong Cyber Defense
-
Ransom Demands Hit a New Monetary Milestone
-
Phishing Emails Impersonate Maritime Industry in Likely BEC Campaign
-
Forecasting: All for One and One for All in Cybersecurity.
-
Getting the Most Out of Threat Intelligence Ingestion
-
Evolving from Incident Response to Threat Intelligence
-
It's All in the Name: A Guide to STIX Naming Conventions
-
Evaluate or Die Trying - Qualitative Evaluation for CTI Feeds
-
Why IOCs Are Not Enough
-
Making room for ACH in a new Object: The Hypothesis Object
-
Moving Past the STIX 2.1 Opinion Object
-
How to Structure Analysis of Competing Hypotheses (ACH)
-
CTI – A community of communities
-
Source crafting: Setting standards in cyber threat intelligence
-
Threat Intelligence Platforms: The Missing Link Between People and Automation
-
Our Journey to Support STIX 2.1