-
Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries
-
ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution
-
Advanced Cybercriminals Rapidly Diversify Cyberattack Channels Following Public Vulnerability Disclosure
-
DarkGate: Opening Gates for Financially Motivated Threat Actors
-
The Rapidly Evolving Landscape of Generative AI Tools, AI-Powered Cyber Threats and AI-Centric Adversarial Tactics
-
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
-
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang
-
Malware-as-a-Service: Redline Stealer Variants Demonstrate a Low-Barrier-to-Entry Threat
-
German Embassy Lure: Likely Part of Campaign Against NATO Aligned Ministries of Foreign Affairs
-
Spearphishing Campaign Targets Zimbra Webmail Portals of Government Organizations
-
Chinese Threat Actor Used Modified Cobalt Strike Variant to Attack Taiwanese Critical Infrastructure
-
Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware
-
Exposed Web Panel Reveals Gamaredon Group's Automated Spear Phishing Campaigns
-
Dark Pink APT Group Strikes Government Entities in South Asian Countries
-
DeFi Hack Recovers Stolen Funds; Blacklotus Bypasses Windows Secure Boot
-
Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain
-
A Year of the Russia-Ukraine War: Seven Types of Cyberattacks Used Against Ukraine
-
Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon
-
Security Service of Ukraine and NATO Allies Potentially Targeted by Russian State-Sponsored Threat Actor
-
2023: Complexity Reigns in Cybersecurity as Existing Threats Adapt and New Technologies Emerge
-
Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware
-
The Godfather Banking Trojan Expands Application Targeting to Affect More Europe-Based Victims
-
QakBot Malware Bypass Windows Security Using Unpatched Vulnerability
-
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security
-
Long Term Analysis Illustrates How Risk Posed by a Vulnerability Changes as Exploits Develop Over Time
-
Threat Actors Merging Malicious Activity With Cryptocurrency Show How the Attack Landscape is Developing in Decentralized Finance
-
Emotet Downloader Document Uses Regsvr32 for Execution
-
Tools to Identify Exfiltration of Large Cryptocurrency Holdings Will Reduce Risk of Large Cyberattacks and Fraud on DeFi Platforms
-
Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape
-
The Analyst Prompt #08: EclecticIQ Data Show Emotet Gained Momentum in Recent Months
-
The Analyst Prompt #07: Ukraine War Related Cyberattack Risk Increases Outside the Main Conflict And Fluid Cybercriminal Marketplaces Maintain Strong User Bases
-
Cyber Resilience and Data Confidentiality are Emerging Components of Healthcare
-
Attack Patterns Produce Growing Losses Targeting Mutual Vulnerabilities Endemic to Decentralized Finance
-
The Analyst Prompt #06: Racoon Stealer Development Hiatus, Updates on LAPSUS$ and North Korean State Backed Operations
-
The Analyst Prompt #05: Russo-Ukrainian Cyberattacks, and Updates on Lapsus$ and Conti Ransomware Operations
-
Understanding Features and Vulnerabilities of The Decentralized Finance Attack Surface is Key to Protecting Against Cyber Attacks
-
The Analyst Prompt #04: MuddyWater APT attributed to Iranian Ministry of Intelligence and Security, and the Increasing Global Ransomware Threat
-
The Analyst Prompt #42: Ransomware Attacks Not Letting Up as 2021 Draws to a Close
-
2021’s Challenges Highlight the Need for Intelligence-Based Cyber Defense
-
The Analyst Prompt #39 Ransomware; Falsified Covid Certificates; US Blacklists NSO Group
-
What does it mean to “Phight the Phish?”
-
The Analyst Prompt #37 Cryptocurrency Regulations; Dutch Info Sharing; New MS Vulnerability
-
Ransomware: Hope for the Best, Prepare for the Worst
-
Malware Marketplaces Provide Newcomers with Expanded Capability
-
An Accelerating Ransomware Threat Needs a Strong Cyber Defense
-
Threat Actors Continually Expand and Evolve Tools, Techniques, and Associations with Other Groups
-
The Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
-
Phishing Emails Impersonate Maritime Industry in Likely BEC Campaign
-
BEYOND THE IOC-Moving from the “what” to the “how” to better stay ahead of emerging attacks
-
EclecticIQ Monthly Vulnerability Trend Report - December 2020
-
QAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital Infrastructure
-
APT Targets COVID-19 Vaccine Supply Chain and Vulnerability in Cisco Security
-
EclecticIQ Monthly Vulnerability Trend Report - November 2020
-
Cobalt Strike Leak, Oracle Vulnerability & Maze Shutdown
-
Probable Increase in Digital Card Skimming During Shopping Holidays
-
EclecticIQ Monthly Vulnerability Trend Report - October 2020
-
EclecticIQ Monthly Vulnerability Trend Report - September 2020
-
EclecticIQ Monthly Vulnerability Trend Report - August 2020
-
EclecticIQ Monthly Vulnerability Trend Report - July 2020
-
CTI Investigation into COVID-19 Contact Tracing Apps
-
EclecticIQ Monthly Vulnerability Trend Report - June 2020
-
Narrator: Generating Intelligence Reports from Structured Data
-
EclecticIQ Monthly Vulnerability Trend Report - May 2020
-
EclecticIQ Monthly Vulnerability Trend Report - April 2020
-
WannaCry 3 Years Later, Could it Happen Again?
-
Evolving Ransomware Threat in the Energy Sector
-
EclecticIQ Monthly Vulnerability Trend Report - March 2020
-
EclecticIQ Monthly Vulnerability Trend Report - February 2020
-
Investigating Phishing Attacks Exploiting Coronavirus Themes
-
EclecticIQ Monthly Vulnerability Trend Report - January 2020
-
2019 CTI Trends and 2020 Predictions
-
EclecticIQ Monthly Vulnerability Trend Report - November 2019
-
EclecticIQ Monthly Vulnerability Trend Report - October 2019
-
Revisiting the question 'Why IOCs are not enough?'
-
EclecticIQ Monthly Vulnerability Trend Report - September 2019
-
The Ransomware Evolution Landscape Part 3 – The New Age of Ransomware and the ‘Triple Threat’
-
The Ransomware Evolution Landscape Part 2 – GandCrab, Sodinokibi and How to Scam a RaaS Operator
-
EclecticIQ Monthly Vulnerability Trend Report - August 2019
-
The Ransomware Evolution Landscape Part 1 – The Rise of the Biggest Cyberthreat
-
EclecticIQ Monthly Vulnerability Trend Report - July 2019
-
2020 Tokyo Summer Olympics From a CTI Perspective
-
EclecticIQ Monthly Vulnerability Trend Report - June 2019
-
Current Techniques and Threats Against the Financial Industry
-
EclecticIQ Monthly Vulnerability Trend Report – April 2019
-
EclecticIQ Monthly Vulnerability Trend Report – March 2019
-
2019 Ransomware Snapshot: Understanding the Current Landscape
-
EclecticIQ Monthly Vulnerability Trend Report - February 2019
-
EclecticIQ Monthly Vulnerability Trend Report - January 2019
-
EclecticIQ Monthly Vulnerability Trend Report - December 2018
-
Threat Intelligence for Critical Infrastructure
-
EclecticIQ Analysis: 2018 Trend Report
-
EclecticIQ Monthly Vulnerability Trend Report - November 2018
-
EclecticIQ Monthly Vulnerability Trend Report - October 2018
-
EclecticIQ Monthly Vulnerability Trend Report - September 2018
-
US Midterm Elections 2018 - Situational Awareness
-
EclecticIQ Monthly Vulnerability Trend Report - August 2018
-
EclecticIQ Monthly Vulnerability Trend Report - July 2018
-
2018 — Playing a Game of Cyber Cat and Mouse