Home users targeted by ransomware, student devices hacked, and IT staff come under attack by new malware in triaging the week 036.
Cybercrime insights, big ransomware payouts, and mass SMS infostealer campaign in triaging the week 035.
NCA has a major takedown, critical Telegram vulnerability, and threat actors exploit the CrowdStrike fiasco in triaging the week 034.
Malicious versions of jQuery, Russian bots taken down, and ViperSoftX malware gets an upgrade in triaging the week 033.
Critical OpenSSH Flaw, Google Offers Big Bucks for KVM Zero-Days, and Child Predators Unmasked Using Infostealer Malware in triaging the week 032.
Rise in Android malware, new GrimResource Windows attack, and WikiLeaks founder Julian Assange released in triaging the week 031.
Intelligence collection sources are the most important component of a CTI program. This guide will teach you what they are and how to use them.
Users get targeted with fake errors and new phishing kits, Scattered Spider hacker gets arrested, and the Kraken crypto exchanges loses millions in triaging the week 030.
CTI analysis bias is inherent in all analysts. You must learn how to overcome it to produce accurate intelligence assessments. This guide will teach you how.
New phishing techniques and campaigns are revealed, leaky GitHub token leads to NYT breach, and Microsoft Azure tags come under attack in triaging the week 029.
CTI report writing is an essential cyber security skill. This guide will teach you why it’s important, the key elements, and how to write a great report.
Snowflake breach impacts major orgs, TitTok hit by zero-day, and several London hospitals caught up in ransomware attack in triaging the week 028.
Estimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know, from probability terms to confidence levels.
Check Point VPN attacked, Hackers abuse Cloudflare Workers and Stack Overflow, and a new ransomware group linked to North Korea in triaging the week 027.
Learn how to perform intrusion analysis in this comprehensive guide that includes a four-step process for success, tips and tricks, and practical examples.