Month: January 2022

A Guide to Instagram's Latest Releases and What's to Come

Instagram has grown to be one of the most popular and influential social media platforms in the world. Instagram was originally launched as a photo and video-sharing social media app for mobile devices. Since its initial launch in 2010 Instagram has evolved into a social networking platform with messaging tools, and ad platforms. But Instagram …

A Guide to Instagram's Latest Releases and What's to Come Read More »

How to Manage Multiple Blogs

Content marketing is a great way to gain visibility for your business and its products or services. Whether you’re establishing thought leadership or simply calling attention to your offerings with useful posts, a good blog can be great for business. But one blog isn’t always sufficient. Maybe your business has multiple divisions and you want …

How to Manage Multiple Blogs Read More »

2021 Shift Year In Review

Looking Back at 2021 2021 has shaped our lives in so many ways, including how we work and collaborate. ‘Remote first’ reigned supreme while hybrid work surfaced as teams transitioned back to the office. As we reflect on this past year, we couldn’t be more proud of this global community and everything we have accomplished …

2021 Shift Year In Review Read More »

Cyber Threat Intelligence: Observing the adversary

By Mark Arena, CEO of Intel 471. Following my previous blog post that compared the incident-centric and actor-centric approaches to cyber threat intelligence, this post will detail a number of ways we can potentially observe our adversary. I’ll preface this post by saying that prioritizing and identifying who the adversary is, their motivations, their intentions …

Cyber Threat Intelligence: Observing the adversary Read More »

Cyber threat intelligence requirements: What are they,…

By Mark Arena, CEO of Intel 471. There are many definitions of what is an intelligence requirement but the definition to me that is most accurate is: “Any subject, general or specific, upon which there is a need for the collection of information, or the production of intelligence.” Ref:http://www.thefreedictionary.com/intelligence+requirement With the above definition I want …

Cyber threat intelligence requirements: What are they,… Read More »

Introducing Intel 471’s Cybercrime Underground General…

By Michael DeBolt, Vice President of Intelligence. In the last blog, I outlined three key benefits of a requirements-driven intelligence program. We also looked at three challenges that are preventing many programs from moving from concept to practice. If you didn’t read it, here’s the TL;DR version: I promised also to share details of how …

Introducing Intel 471’s Cybercrime Underground General… Read More »

Malicious actors leverage Coronavirus Disease 2019…

By the Intel 471 Intelligence Analysis team. Our lives continue to be inundated with emails, mobile applications and websites that promise to deliver critical information related to the Coronavirus Disease 2019 (COVID)-19 pandemic threatening millions of people across the globe. Fear surrounding the disease has been exploited by attackers with adverse intentions who have launched …

Malicious actors leverage Coronavirus Disease 2019… Read More »

REvil Ransomware-as-a-Service: An analysis of a…

By the Intel 471 Malware Intelligence team. Summary REvil aka Sodinokibi, Sodin is a ransomware family operated as a ransomware-as-a-service (RaaS). Deployments of REvil first were observed in April 2019, where attackers leveraged a vulnerability in Oracle WebLogic servers tracked as CVE-2019-2725. REvil is highly configurable and allows operators to customize the way it behaves …

REvil Ransomware-as-a-Service: An analysis of a… Read More »

Understanding the relationship between Emotet, Ryuk…

By the Intel 471 Malware Intelligence team. One of the more notable relationships in the world of cybercrime is that between Emotet, Ryuk and TrickBot. This loader-ransomware-banker trifecta has wreaked havoc in the business world over the past two years, causing millions of dollars in damages and ransoms paid. Our Malware Intelligence team receives a …

Understanding the relationship between Emotet, Ryuk… Read More »

COVID-19 pandemic: Through the eyes of a cybercriminal

By the Intel 471 Intelligence team. Cybercriminals’ exploitation of the global Coronavirus Disease 2019 (COVID-19) pandemic (in phishing lures, for example) has been covered widely in the media. But one underreported aspect is how the coronavirus itself is impacting cybercrime actors, their activities and their infrastructure. Our research of the underground marketplace and these actors …

COVID-19 pandemic: Through the eyes of a cybercriminal Read More »