Intel471Inc Profile Banner
Intel 471 Profile
Intel 471

@Intel471Inc

Followers
9K
Following
697
Media
549
Statuses
2K

Your Voice of Reason and Truth

Everywhere & Nowhere
Joined May 2014
Don't wanna be here? Send us removal request.
@SLEUTHCON
SLEUTHCON
15 days
Check out @Intel471Inc's Cybercrime Exposed podcast episode on DukeEugene, featuring Simon Williams, who joined us at SLEUTHCON earlier this year to discuss the rise and fall of this infamous Russian hacker. Listen to the episode here: https://t.co/iSaVr15xIz
0
2
8
@Intel471Inc
Intel 471
15 days
The Shai-Hulud worm is spreading through the Node.js ecosystem, compromising 500+ npm packages and harvesting developer credentials. Read Intel 471’s full report: https://t.co/5iZgFFvIxD #threathunting #emergingthreat #cybersecurity
2
4
10
@Intel471Inc
Intel 471
22 days
Persistence can look routine: a registry key, service, or task. Learn to spot what’s dangerous in our Level 2 #ThreatHunting Workshop tomorrow, Sept 24, 12–1 PM ET. Earn the badge by completing the final challenge. Register: https://t.co/vw0GQwHrZV #threatintel #cybersecurity
2
2
2
@Intel471Inc
Intel 471
28 days
Join our Level 2 #ThreatHunting Workshop on Sept 24 to sharpen your process and expose persistence in real-world conditions. Plus, you'll get the chance to earn your Persistence (Level 2) badge. Sign up: https://t.co/3b2Kod0tRE #threatintel #persistence #cybersecurity
0
0
7
@Intel471Inc
Intel 471
1 month
Security teams are learning fast as they put #AI to work. On 11 Sept 2025, join Out of the Woods: The Threat Hunting Podcast for a live discussion where you can share what’s working, what’s not, and what’s next: https://t.co/UnZsc4oaKL #threathunting #cybersecurity #CTI
0
0
3
@Intel471Inc
Intel 471
1 month
🚨 EMERGING THREAT: AMOS STEALER 🚨 A new macOS infostealer targeting credentials, crypto wallets & sensitive data, with variants like Odyssey & Banshee expanding its reach. Full report: https://t.co/3wUdA5yOho #emergingthreat #threathunting #cybersecurity #threatintel
0
10
22
@Intel471Inc
Intel 471
1 month
Initial access brokers are fueling ransomware. From June 2024 - May 2025, Intel 471 tracked 4,878 access offers and found 70 correlations with victims on leak sites. Average time from offer to victim: 19 days. Read more: https://t.co/eu2afSgDbs #cybersecurity #threatintel
intel471.com
Initial access brokers (IABs) sell access to compromised organizations on underground forums. Here's an analysis looking at whether these offers can be correlated to ransomware attacks.
1
0
3
@Intel471Inc
Intel 471
1 month
Join us for the next Threat Hunting Workshop: Hunting for Persistence – Level 2 on Sept 24, 12–1 PM ET! Earn your Persistence (Level 2) badge & gain resources to strengthen future hunts. Register: https://t.co/bYHxo1gaIc #threathunting #threatintel #cybersecurity #persistence
5
1
8
@Intel471Inc
Intel 471
2 months
Enterprise Security Tech featured Intel 471’s launch of Verity471, a unified cyber threat intelligence platform built by practitioners for practitioners. Verity471 connects real-time threats to the exposures that matter most. Read more: https://t.co/F1kNnppcGJ #threatintel #CTI
0
3
4
@Intel471Inc
Intel 471
2 months
#AI is reshaping security operations, but is it helping as much as we think? On September 11, 2025, join the live Out of the Woods: The #ThreatHunting Podcast for real-world wins, challenges, and where human expertise still leads: https://t.co/ymet5uRzic #cybersecurity
1
0
0
@Intel471Inc
Intel 471
3 months
Tomorrow: Intel 471’s malware-focused #threathunting workshop. Join us at 11:00 AM ET for a live session built around real #threatintel, guided hunting, and a final challenge to earn your badge. Register: https://t.co/xsHT0IvjXv #cybersecurity #CTI #malware
0
0
2
@Intel471Inc
Intel 471
3 months
FileFix abuses File Explorer's address bar by tricking users into pasting clipboard commands that silently run malware. Read the full report: https://t.co/CIao3Vi6Sl #threathunting #emergingthreat #cybersecurity
1
7
17
@Intel471Inc
Intel 471
3 months
Intel 471’s next #threathunting workshop zeroes in on #malware. Join us July 31 at 11 AM ET to explore how malware behaviors reveal adversary intent and how to hunt them in live environments: https://t.co/WAKop4uHAU #threatintel #cybersecurity #CTI
2
3
4
@Intel471Inc
Intel 471
3 months
Threat hunting finds what detection misses. Intel 471's new paper explains how CISOs are using intelligence-driven hunts to reduce dwell time and stay ahead of persistent threats. Read more: https://t.co/eBmO7GBwZX #cybersecurity #threathunting #cybercrime #threatintel
0
2
4
@Intel471Inc
Intel 471
3 months
Executives are taking a larger role in #CTI priorities. Our new brief breaks down key findings from the SANS 2025 Survey and how CTI teams can better support business risk decisions. Download here: https://t.co/3g0opx5GnO #cyberrisk #threatintel #SANS2025
1
2
1
@Intel471Inc
Intel 471
3 months
AI is changing how #threathunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how #AI is used in real workflows, where it adds value, and where it falls short. Register: https://t.co/vz6CONOdWt #threathunting #cybersecurity
0
0
1
@Intel471Inc
Intel 471
3 months
Ransomware, phishing, and supply chain attacks are hitting the #automotiveindustry harder each year. Our latest report breaks down the top #cyberthreats and what security teams need to know: https://t.co/mv7V2LYM57 #threatintel #cybersecurity
0
2
3
@Intel471Inc
Intel 471
3 months
How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: https://t.co/xPDKlbYsRQ #cybersecurity #CTI
0
2
5
@Intel471Inc
Intel 471
4 months
How are #threathunting teams actually using AI? On July 10, we’re going live with a technical discussion on what #AI enables, what problems it creates, and how teams are adapting. Register & join the conversation: https://t.co/riYIO3XLKd #cybersecurity #threatintel
0
0
0
@Intel471Inc
Intel 471
4 months
🚨 EMERGING THREAT: MOMMY ACCESS BROKER Leaked guide linked to mommy reveals how this actor exploits CVEs and sells access to high-value targets like governments and telecoms. 🔗 Read the full report: https://t.co/X5LaA8XnAR #threatintel #cybersecurity #threathunting
1
5
10