Advertisement · 728 × 90
#
Hashtag
#CyberThreatIntel
Advertisement · 728 × 90
Post image Post image

i seem to have found a reasonable balance on throughput & stability... 🤫🤫🤫😅 #CyberThreatIntel #opensource

1 0 0 0

Find the full breakdown here 👉https://threatfox.abuse.ch/statistics/

#ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

1 0 0 0
Post image

🚨 LunoBotnet uncovered → Linux malware that cryptomines + launches modular DDoS.

It self-heals, replaces binaries, and even targets Roblox, Minecraft, Valve servers. Operators are selling it via Telegram.

💬 Is this the future of botnet-for-hire? Follow @Technadu for more.

#Cyble #CyberThreatIntel

0 0 0 0
Post image

AI trickery, targeted ops, & poisoned websites — this week’s Cyber Watch has it all. Anomali Threat Research covers PromptLock, Blind Eagle APT, and Lovable Website Attacks. 👉 https://bit.ly/42bpdNK

#ThreatIntelligence #CyberThreatIntel #CTI #SOC #ThreatDetection

0 0 0 0
Thread

🌐 Great to see the community putting Thread to work!
Folks are jumping into app.arachne.digital/thread to map news + reports to MITRE ATT&CK.

Tried it yet? Let us know what you mapped 👇

#CyberThreatIntel #MITREATTACK #ThreatInformedDefense #OpenSource

1 1 0 0
Post image

🔎 In this week’s Anomali Cyber Watch, Anomali’s Threat Research team spotlight phishing campaigns targeting law firms, dual-implant RAT using steganography, USB-borne cryptominers, and Apple ImageIO Zero-Day: https://bit.ly/4n0PBC7

#ThreatIntelligence #CyberThreatIntel #CTI #SOC #ThreatDetection

0 0 0 0
Preview
Contact Have questions or need support? Contact us at Silent Push for prompt assistance from our dedicated team, committed to your satisfaction.

We are contacting affected rights-holders as part of our notification process.

Silent Push encourages other brands concerned about piracy to reach out: www.silentpush.com/contact

#cyberthreatintel #piracy #IPTV

0 0 0 0

Navigating the Invisible

Learn how to use AIS data, port logs & social media to build threat models—no packets needed, just OSINT.

🕒 16:30 | Creator Stage 3 (Room 231)

#MaritimeOSINT #CyberThreatIntel #DEFCON33 #DEFCONSpeakers #DEFCONCreators @defcon@defcon.social

0 0 0 0

🎧 Rational Security
The “SkrillEx Parte” Edition (74min)
Listen
Details
#RationalSecurity #CyberThreatIntel #SkrillExParte

0 0 0 0

❤️🔥 In the dark, we are all the same.❤️🔥

— Yasmine | IndigoINT

#ThreatIntelligence #CyberSecurity #CTI #BlueTeam #Infosec #NotionForAnalysts #NeurodivergentFriendly #MalwareAnalysis #CyberThreatIntel #IntelOps #MalwareTikTok #NotionTemplates

0 0 0 0
Post image

🚨 New Private Multichain Drainer spotted on underground forums. Advertised for $500, it targets wallets via Smart Contract abuse (permit, Swap, SeaPort, x2y2) across ETH, BSC, Polygon, Arbitrum & more. Designed for scam pages, airdrops, & phishing kits. #CyberThreatIntel #Web3

0 0 1 0
Preview
DanaBot malware operators exposed via C2 bug added in 2022 A vulnerability in the DanaBot malware operation introduced in June 2022 update led to the identification, indictment, and dismantling of their operations in a recent law enforcement action.

🐞 DanaBot slips up: a bug in its C2 code exposed operators after years of stealth. Even malware makes mistakes—this one just cost its creators their cover. #MalwareOps 🕵️ #CyberThreatIntel 🔍

0 0 0 0
Post image

Latest insight from ABS Consulting's Michael DeVolld reveals why #maritime needs decisive action on #cyber risk, and explains about the evolving #regulation and #cyberthreat landscape: www.abs-group.com/News-and-Eve...

#cyberthreatintel #cyber #cybersecurity #editors #news

0 0 0 0

Just lifted the mask—time to build the personal brand. 🎭
Sharing threat intel, CTI insights, and tips for breaking into the field.

Follow for deep dives + analysis. Let’s grow and defend together. 🛡️
#CTI #CyberThreatIntel #ThreatHunting #InfoSec #CyberSecurity

0 0 0 0
Post image

You know him from MSTIC and KC7!

Catch Simeon Kakpovi at #SLEUTHCON 2025 this June!

🎟️ Grab your tix today! >>> www.sleuthcon.com

#CyberThreatIntel #InfosecEvents

0 0 0 0
Preview
Ransomware attack triggers ‘system-wide’ tech outage at large network of medical centers | CNN Politics A ransomware attack has triggered a “system-wide technology outage” at a network of over a dozen medical centers in Ohio, causing the cancellation of elective inpatient and outpatient procedures, acco...

www.cnn.com/2025/05/20/p...

TL;DR:
Multiple U.S. hospitals hit by ransomware, halting care and exposing patient data. Attackers exploited outdated systems. Zero Trust and rapid patching aren’t optional—they’re survival.

#TLDRSecurity #ObsidianEnoch #CyberThreatIntel #BlueTeamOps #RansomwareAttack

0 0 0 0
Post image

🕵️‍♂️ OSINT pros & ethical hackers: Tired of scattered CVE data? BaseFortify.eu brings attack paths, CVEs, CAPEC & CISA KEV together — all matched to real-world systems.

🧠 Investigate smarter: basefortify.eu #OSINT #EthicalHacking #CyberThreatIntel

2 0 1 0
Preview
EUVD European Vulnerability Database

ENISA just dropped the EU Vulnerability Database (EUVD), a central hub for vuln data, mandated by NIS2. Open access, actionable info, and support for open-source tools like Vulnerability-Lookup. Big move for EU cyber resilience.

Check it here: euvd.enisa.europa.eu

#CyberThreatIntel #EUVD #VulnMgmt

6 3 0 0
Update to How CISA Shares Cyber-Related Alerts and Notifications | CISA CISA is changing how we announce cybersecurity updates and the release of new guidance.

CISA just changed how it shares cyber alerts:

🚨 Only urgent threats on their Alerts page
📬 Routine stuff? Email & socials
🛠️ KEV? Use GovDelivery

Link: www.cisa.gov/news-events/...

Now’s a good time to check how you’re getting CISA alerts. Don’t miss the signal. #CyberThreatIntel #CISA #Infosec

1 1 0 0
Post image

Catch Daniel Schwalbe at #SLEUTHCON 2025

Mentor. Educator. DNS and threat intel expert.

A trusted voice across gov, higher ed, and enterprise.

🎟️ Grab your tix >>> www.sleuthcon.com

#CyberThreatIntel #IncidentResponse #InfosecCommunity

2 1 0 0
Preview
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.

COLDRIVER just leveled up.

Google TAG says the Russian APT is now dropping Rust-based malware (SPICA) via fake PDFs + malicious LNK files in ZIPs. From phishing creds to custom malware—this is a serious pivot.

Article: blog.google/threat-analy...

#CyberThreatIntel #APT #COLDRIVER #Malware

1 0 0 0
Post image

High-dollar fraud, deranged violence, and a mysterious criminal culture.

@nixonnixoff.bsky.social and Ben Coon explain how ”The Com” works, only at #SLEUTHCON

📍 June 6 | Arlington + virtual

🔗 www.sleuthcon.com

#CyberThreatIntel #InfosecEvents

2 0 0 2
Preview
Paralus LLC: Threat Intel + DE&TH Hello and thank you for your interest in a one-day workshop focusing on Cyber Threat Intelligence (CTI) core principles extended to Detection Engineering & Threat Hunting (DE&TH)! Scheduling: 14-17 J...

I’ll teach a rare, public, online session of my Paralus #CTI #CyberThreatIntel + #DetectionEngineering & #ThreatHunting (DE&TH) in July - register your interest at the following form:

forms.gle/AkdPY7pvQZ6o...

15 6 0 0
Post image

Alex Delamotte joins us again at #SLEUTHCON 2025!

She’s spent a decade analyzing adversary pivots and cybercrime trends, now she’s back to share more.

Don’t miss it!

🎟️ www.sleuthcon.com

#CyberThreatIntel #InfosecEvents

0 0 0 0
Post image

🦊 ThreatFox Update | IOCs don’t last forever and internet infrastructure often gets re-used. To avoid false positives, we’re now expiring IOCs older than 6 months. Expired IOCs will no longer appear in ThreatFox exports or be published via the ThreatFox APIs. #ThreatFox #IOC #CyberThreatIntel

1 0 0 0
Post image

From PhD work to award-winning cybercrime research, @milenkowski.bsky.social of SentinelLABS is a force in malware analysis.

Catch his talk at #SLEUTHCON 2025!

🎟️ Grab your ticket today >>> www.sleuthcon.com

#CyberThreatIntel #InfosecEvents

4 2 0 0
Video

🎥 Curious how to decode social media threats?
Check out this snippet from our latest webinar where we break down the ABC Framework: Actors, Behaviors & Content.

Watch the full session: graphika.com/reports/the-...

#CyberThreatIntel #TrustAndSafety #Graphika #Webinar

0 0 0 0
Open Source Cyber Security: A Walkthrough of Thread
Open Source Cyber Security: A Walkthrough of Thread YouTube video by Arachne Digital

Discover how to harness Thread! Our open-source tool maps free text to frameworks like MITRE ATT&CK®, helping analysts decode threats faster. Watch the video to learn setup, key features, and tips to streamline your workflow. 🌐 #CyberThreatIntel #OpenSource

www.youtube.com/watch?v=nRpu...

2 0 0 0