
Intel 471
@Intel471Inc
Followers
9K
Following
696
Media
541
Statuses
2K
Your Voice of Reason and Truth
Everywhere & Nowhere
Joined May 2014
Tomorrow: Intel 471’s malware-focused #threathunting workshop. Join us at 11:00 AM ET for a live session built around real #threatintel, guided hunting, and a final challenge to earn your badge. Register: #cybersecurity #CTI #malware
0
0
2
FileFix abuses File Explorer's address bar by tricking users into pasting clipboard commands that silently run malware. Read the full report: #threathunting #emergingthreat #cybersecurity
1
7
17
Intel 471’s next #threathunting workshop zeroes in on #malware. Join us July 31 at 11 AM ET to explore how malware behaviors reveal adversary intent and how to hunt them in live environments: #threatintel #cybersecurity #CTI
2
3
4
Threat hunting finds what detection misses. Intel 471's new paper explains how CISOs are using intelligence-driven hunts to reduce dwell time and stay ahead of persistent threats. Read more: #cybersecurity #threathunting #cybercrime #threatintel
0
1
4
Executives are taking a larger role in #CTI priorities. Our new brief breaks down key findings from the SANS 2025 Survey and how CTI teams can better support business risk decisions. Download here: #cyberrisk #threatintel #SANS2025
1
1
1
AI is changing how #threathunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how #AI is used in real workflows, where it adds value, and where it falls short. Register: #threathunting #cybersecurity
0
0
1
Ransomware, phishing, and supply chain attacks are hitting the #automotiveindustry harder each year. Our latest report breaks down the top #cyberthreats and what security teams need to know: #threatintel #cybersecurity
0
2
3
How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: #cybersecurity #CTI
0
2
5
How are #threathunting teams actually using AI? On July 10, we’re going live with a technical discussion on what #AI enables, what problems it creates, and how teams are adapting. Register & join the conversation: #cybersecurity #threatintel
0
0
0
🚨 EMERGING THREAT: MOMMY ACCESS BROKER.Leaked guide linked to mommy reveals how this actor exploits CVEs and sells access to high-value targets like governments and telecoms. 🔗 Read the full report: #threatintel #cybersecurity #threathunting
1
5
10
CTI teams are under pressure to mature fast. In this #SANS webcast, Intel 471’s Ashley Jess shares insights on integrating #geopolitics and measuring CTI value using frameworks like CTI-CMM & CU-GIRH. Watch the full discussion: #CTI #cybersecurity.
intel471.com
The SANS Institute has released its SANS 2025 CTI Survey report, an influential pulse-check of cyber threat intelligence (CTI) trends, challenges, and use cases. On May 21, 2025, Ashley Jess, a...
0
6
27
#DragonForce ransomware affiliates used registry changes to maintain persistence before launching attacks. This case study shows how threat hunters can detect the technique early using behavioral hunting, not just IOCs: #threathunting #CTI #cybersecurity.
intel471.com
After compromising a system, attackers seek ways to maintain persistence. Here's how to threat hunt for a common persistence method used by attackers including DragonForce.
0
10
44
AI is changing how threat hunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how AI is used in real workflows, where it adds value, and where it falls short. Register: #threathunting #cybersecurity
0
2
2
Learn how to structure threat hunting to support Intel, SecOps, and Engineering. Join Intel 471’s Scott Poley tomorrow at 12 PM ET for our next management workshop. Certificate awarded on completion. Sign up: #threathunting #cybersecurity
0
0
1
Strong hunting programs rely on coordination. Join Intel 471’s Scott Poley tomorrow at 12 PM ET to learn how to align threat hunting with Intel, SecOps, and Engineering. Includes a certificate in Cross-Team Collaboration. Sign up: #threathunting
0
1
3
Join Intel 471's Level 2 Threat Hunting Workshop on Execution tomorrow, May 14 from 12 - 1 PM EDT. Investigate PowerShell abuse, LOLBins, macro payloads, and more using real-world data. Finish the challenge, earn your #threathunting badge. Register now:
0
1
4
In this Studio 471 episode, Tom Bolitho of FTI Consulting joins Intel 471’s Jeremy Kirk to share how organizations can manage public scrutiny, media pressure, and data leaks during a crisis. Tune in: #threatintelligence #cybersecurity #threathunting.
intel471.com
Cyber incidents pose not only technical challenges but communications challenges. Tom Bolitho of FTI Consulting shares guidance on successful strategies to manage complex stakeholder demands and...
0
1
3
In this live episode of Out of the Woods, we’ll examine threat actor behavior from initial access to impact. Techniques, targeting, and decisions will be revealed as we go, with the actor named at the end. Join us: #threathunting #cybersecurity
0
0
1
Live on May 14 @ 12 PM ET: Intel 471’s Level 2 Execution Threat Hunting Workshop. Refine your skills in a guided, hands-on session using real data, threat intel, and tools you keep. Earn your certification badge. Register now: #threathunting
0
0
3