Intel471Inc Profile Banner
Intel 471 Profile
Intel 471

@Intel471Inc

Followers
9K
Following
696
Media
541
Statuses
2K

Your Voice of Reason and Truth

Everywhere & Nowhere
Joined May 2014
Don't wanna be here? Send us removal request.
@Intel471Inc
Intel 471
10 days
Tomorrow: Intel 471’s malware-focused #threathunting workshop. Join us at 11:00 AM ET for a live session built around real #threatintel, guided hunting, and a final challenge to earn your badge. Register: #cybersecurity #CTI #malware
Tweet media one
0
0
2
@Intel471Inc
Intel 471
11 days
FileFix abuses File Explorer's address bar by tricking users into pasting clipboard commands that silently run malware. Read the full report: #threathunting #emergingthreat #cybersecurity
Tweet media one
1
7
17
@Intel471Inc
Intel 471
17 days
Intel 471’s next #threathunting workshop zeroes in on #malware. Join us July 31 at 11 AM ET to explore how malware behaviors reveal adversary intent and how to hunt them in live environments: #threatintel #cybersecurity #CTI
Tweet media one
2
3
4
@Intel471Inc
Intel 471
22 days
Threat hunting finds what detection misses. Intel 471's new paper explains how CISOs are using intelligence-driven hunts to reduce dwell time and stay ahead of persistent threats. Read more: #cybersecurity #threathunting #cybercrime #threatintel
Tweet media one
0
1
4
@Intel471Inc
Intel 471
29 days
Executives are taking a larger role in #CTI priorities. Our new brief breaks down key findings from the SANS 2025 Survey and how CTI teams can better support business risk decisions. Download here: #cyberrisk #threatintel #SANS2025
Tweet media one
1
1
1
@Intel471Inc
Intel 471
30 days
AI is changing how #threathunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how #AI is used in real workflows, where it adds value, and where it falls short. Register: #threathunting #cybersecurity
Tweet media one
0
0
1
@Intel471Inc
Intel 471
1 month
Ransomware, phishing, and supply chain attacks are hitting the #automotiveindustry harder each year. Our latest report breaks down the top #cyberthreats and what security teams need to know: #threatintel #cybersecurity
Tweet media one
0
2
3
@Intel471Inc
Intel 471
1 month
How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: #cybersecurity #CTI
Tweet media one
0
2
5
@Intel471Inc
Intel 471
1 month
How are #threathunting teams actually using AI? On July 10, we’re going live with a technical discussion on what #AI enables, what problems it creates, and how teams are adapting. Register & join the conversation: #cybersecurity #threatintel
Tweet media one
0
0
0
@Intel471Inc
Intel 471
1 month
🚨 EMERGING THREAT: MOMMY ACCESS BROKER.Leaked guide linked to mommy reveals how this actor exploits CVEs and sells access to high-value targets like governments and telecoms. 🔗 Read the full report: #threatintel #cybersecurity #threathunting
Tweet media one
1
5
10
@Intel471Inc
Intel 471
1 month
CTI teams are under pressure to mature fast. In this #SANS webcast, Intel 471’s Ashley Jess shares insights on integrating #geopolitics and measuring CTI value using frameworks like CTI-CMM & CU-GIRH. Watch the full discussion: #CTI #cybersecurity.
Tweet card summary image
intel471.com
The SANS Institute has released its SANS 2025 CTI Survey report, an influential pulse-check of cyber threat intelligence (CTI) trends, challenges, and use cases. On May 21, 2025, Ashley Jess, a...
0
6
27
@Intel471Inc
Intel 471
2 months
#DragonForce ransomware affiliates used registry changes to maintain persistence before launching attacks. This case study shows how threat hunters can detect the technique early using behavioral hunting, not just IOCs: #threathunting #CTI #cybersecurity.
Tweet card summary image
intel471.com
After compromising a system, attackers seek ways to maintain persistence. Here's how to threat hunt for a common persistence method used by attackers including DragonForce.
0
10
44
@Intel471Inc
Intel 471
2 months
AI is changing how threat hunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how AI is used in real workflows, where it adds value, and where it falls short. Register: #threathunting #cybersecurity
Tweet media one
0
2
2
@Intel471Inc
Intel 471
2 months
Learn how to structure threat hunting to support Intel, SecOps, and Engineering. Join Intel 471’s Scott Poley tomorrow at 12 PM ET for our next management workshop. Certificate awarded on completion. Sign up: #threathunting #cybersecurity
Tweet media one
0
0
1
@Intel471Inc
Intel 471
2 months
Strong hunting programs rely on coordination. Join Intel 471’s Scott Poley tomorrow at 12 PM ET to learn how to align threat hunting with Intel, SecOps, and Engineering. Includes a certificate in Cross-Team Collaboration. Sign up: #threathunting
Tweet media one
0
1
3
@Intel471Inc
Intel 471
2 months
Threat hunting only works when teams do. Join Scott Poley tomorrow at 12 PM ET for a workshop on improving collaboration across Intel, SecOps, and Engineering. Certificate in Cross-Team Collaboration included. Sign up:
Tweet media one
0
0
1
@Intel471Inc
Intel 471
3 months
Join Intel 471's Level 2 Threat Hunting Workshop on Execution tomorrow, May 14 from 12 - 1 PM EDT. Investigate PowerShell abuse, LOLBins, macro payloads, and more using real-world data. Finish the challenge, earn your #threathunting badge. Register now:
Tweet media one
0
1
4
@Intel471Inc
Intel 471
3 months
In this Studio 471 episode, Tom Bolitho of FTI Consulting joins Intel 471’s Jeremy Kirk to share how organizations can manage public scrutiny, media pressure, and data leaks during a crisis. Tune in: #threatintelligence #cybersecurity #threathunting.
Tweet card summary image
intel471.com
Cyber incidents pose not only technical challenges but communications challenges. Tom Bolitho of FTI Consulting shares guidance on successful strategies to manage complex stakeholder demands and...
0
1
3
@Intel471Inc
Intel 471
3 months
In this live episode of Out of the Woods, we’ll examine threat actor behavior from initial access to impact. Techniques, targeting, and decisions will be revealed as we go, with the actor named at the end. Join us: #threathunting #cybersecurity
Tweet media one
0
0
1
@Intel471Inc
Intel 471
3 months
Live on May 14 @ 12 PM ET: Intel 471’s Level 2 Execution Threat Hunting Workshop. Refine your skills in a guided, hands-on session using real data, threat intel, and tools you keep. Earn your certification badge. Register now: #threathunting
Tweet media one
0
0
3