Triaging the Week 072

Passwordless authentication is the future, DragonForce ransomware targets UK retailers, and Linux wiper hits the scene in triaging the week 072.
Passwordless authentication is the future, DragonForce ransomware targets UK retailers, and Linux wiper hits the scene in triaging the week 072.
Learn how to create effective threat profiles to identify and prioritize relevant cyber threats for your organization. A structured approach to threat-informed defence.
Critical vulnerabilities in SAP NetWeaver and Apple AirBorne, New InfoStealers, and ransomware gangs change branding model in triaging the week.
Learn how to build a cyber threat intelligence collection plan to systematically track your intelligence requirements and make them actionable.
ClickFix attacks dominate headlines, MITRE ATT&CK v17 released, and major UK store hit by cyber attack in triaging the week 070.
Learn how to create priority intelligence requirements (PIRs) that ensure your cyber threat intelligence team focuses on what matters most to your business.
CVE program in chaos, vulnerabilities hit Fortinet devices and Windows Task Scheduler, and coding scams trick developers in triaging the week 069.
Learn how to use Intelligence Preparation of the Cyber Environment (IPCE) and PESTLE analysis to evaluate risks in your business’s cyber environment.
Malicious Python packages and VSCode extensions, flaws in Fortinet and CrushFTP, and EC2 sites impacted by SSRF bugs in triaging the week 068.
Unlock the eight key principles of intelligence to ensure your next CTI product is actionable, timely, and tailored to your intelligence consumer.
North Korea expands fake IT workers scheme, QR code phishing is the hot new attack vector, and critical RCE is Apache Parquet drops in triaging the week 067.
Learn how to plan a CTI project and the key documentation you need in this comprehensive guide. Avoid roadblocks and set your project up for success.
Discover how to identify threat actors, their motivation, intent, and capability so you can prioritize defenses and allocate resources effectively.
Identity attack and InfoStealer surge in 2025, Apache Tomcat vulnerability and GitHub supply chain attack impact many, and Windows zero-day fuels APT attacks in triaging the week 066.
Learn how to use the F3EAD intelligence loop to add structure to your cyber threat intelligence work and generate actionable intelligence in this guide.