-
ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution
-
Turla APT Targets Albania With Backdooor in Ongoing Campaign to Breach European Organizations
-
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
-
WikiLoader Delivery Spikes in February 2024
-
10 Steps to Building a Comprehensive CTI Practice
-
Advanced Cybercriminals Rapidly Diversify Cyberattack Channels Following Public Vulnerability Disclosure
-
DarkGate: Opening Gates for Financially Motivated Threat Actors
-
Star Blizzard Operations Linked to Russian Intelligence Agency; APT28 Targets NATO’s Rapid Response
-
The Rapidly Evolving Landscape of Generative AI Tools, AI-Powered Cyber Threats and AI-Centric Adversarial Tactics
-
ChatGPT Vulnerability; LockBit Cyberattack On ICBC; US Water Authority Hacked
-
Sandworm Targets Ukraine's Critical Infrastructure; Overlooked AI Privacy Challenges
-
Navigating Cyber Challenges: Biden's AI Executive Order, Ransomware Attack on German Municipalities
-
Cisco IOS XE Web UI Privilege Escalation Vulnerability; Sandworm Targets Ukrainian Telecom
-
Johnson Controls Ransomware Attack; McLaren Health Care Data Breach; Unpatched Exim Vulnerability; Lazarus LinkedIn Attack; NATO Cyber Breach
-
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
-
Ransomware and DDoS Feature in The Apex of Crime-as-a-Service Report
-
Qakbot Infrastructure Takedown, UNC4841 Exploits Barracuda Zero-Day
-
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang
-
Flax Typhoon targeting Taiwan, Ransomware Emphasizing Linux-Centric Payloads
-
Malware-as-a-Service: Redline Stealer Variants Demonstrate a Low-Barrier-to-Entry Threat
-
Black Bersek Malware, Large Language Model Adaption For Offensive Cyber Capabilities
-
German Embassy Lure: Likely Part of Campaign Against NATO Aligned Ministries of Foreign Affairs
-
Norwegian Cyberattack, Virustotal Data Leak and AI powered BEC
-
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
-
Spearphishing Campaign Targets Zimbra Webmail Portals of Government Organizations
-
8Base Ransomware Surge; SmugX Targeting European Governments; Russian-Linked DDoS Warning
-
Early High-Profile Cyberattacks Provide Best-Practices For Cryptocurrency Platforms Prior to Established Attack Pattens
-
New Vulnerabilities Related to Moveit; Potential Impact of Legislation on Large Language Models
-
FIN7 delivering Clop ransomware; ChatGPT and Midjourney imposter apps deliver BatLoader
-
Russian Malware Network Dismantled; Iranian Threat Actors Attack PaperCut Servers
-
Trends and Predictions of Growing Cryptocurrency Cyberattacks
-
Creative Ransomware Extortion; Further Malware Capabilities With ChatGPT
-
3CX Incident Attributed to North Korea; New LockBit MacOS Sample
-
CISA Warns of Telerik Vulnerability; Kimsuky Steal Gmail Emails
-
2021’s Challenges Highlight the Need for Intelligence-Based Cyber Defense
-
Countering the Ransomware Threat When There Is No Silver Bullet
-
What does it mean to “Put Cybersecurity First?"
-
What Does It Mean to Work in Cybersecurity?
-
REvil and Darkside Successor Launches Operations as United States Establishes Joint Cyber Defense Collaborative
-
An Accelerating Ransomware Threat Needs a Strong Cyber Defense
-
Introducing Our New Platform and Our Intelligence at the Core Philosophy
-
The Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
-
Credentials and Cryptocurrency Are Targets of Recent Exploits
-
BEYOND THE IOC-Moving from the “what” to the “how” to better stay ahead of emerging attacks
-
Attacks Target Healthcare Sector, Including COVID-19 Vaccine Research
-
EclecticIQ Monthly Vulnerability Trend Report - December 2020
-
QAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital Infrastructure
-
APT Targets COVID-19 Vaccine Supply Chain and Vulnerability in Cisco Security
-
Prevention is better than cure in Cybersecurity
-
EclecticIQ Monthly Vulnerability Trend Report - November 2020
-
Cobalt Strike Leak, Oracle Vulnerability & Maze Shutdown
-
Forecasting: All for One and One for All in Cybersecurity.
-
Ten Years Later, EclecticIQ Examines Evolution of Stuxnet-like Attacks
-
Getting the Most Out of Threat Intelligence Ingestion
-
Narrator: Generating Intelligence Reports from Structured Data
-
Evolving from Incident Response to Threat Intelligence
-
Re-imaging threat detection, hunting and response with CTI
-
Kubernetes: How to scale for success
-
It's All in the Name: A Guide to STIX Naming Conventions
-
Evaluate or Die Trying - Qualitative Evaluation for CTI Feeds
-
Why IOCs Are Not Enough
-
Making room for ACH in a new Object: The Hypothesis Object
-
Moving Past the STIX 2.1 Opinion Object
-
How to Structure Analysis of Competing Hypotheses (ACH)
-
CTI – A community of communities
-
EclecticIQ Monthly Vulnerability Trend Report - September 2018
-
EclecticIQ Monthly Vulnerability Trend Report - August 2018
-
Source crafting: Setting standards in cyber threat intelligence
-
EclecticIQ Monthly Vulnerability Trend Report - July 2018
-
Threat Intelligence Platforms: The Missing Link Between People and Automation
-
Our Journey to Support STIX 2.1