home.social

#cyberthreatintel — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cyberthreatintel, aggregated by home.social.

  1. The Rhysida ransomware group claims it breached the Cheyenne and Arapaho Tribes, demanding 10 BTC after disrupting education and administrative systems.

    Governor Reggie Wassana confirmed refusal to negotiate.

    Rhysida has a history of targeting public-sector networks, including state and municipal infrastructure.

    Technical considerations:
    • Initial access vector? Phishing vs exposed RDP?
    • Backup segmentation and immutability
    • Insurance-driven IR workflows
    • Data exfiltration + double extortion tactics
    • Public-sector attack surface mapping
    Should smaller governments move toward managed detection and response (MDR) as a baseline requirement?

    Source: therecord.media/cheyenne-arapa

    Share your technical insights below.

    Follow @technadu for advanced ransomware intelligence.

    #Ransomware #ThreatHunting #IncidentResponse #PublicSectorSecurity #CyberResilience #BlueTeam #Infosec #GovTech #DigitalForensics #CyberThreatIntel #DataProtection #SOC #ZeroTrust

  2. The Rhysida ransomware group claims it breached the Cheyenne and Arapaho Tribes, demanding 10 BTC after disrupting education and administrative systems.

    Governor Reggie Wassana confirmed refusal to negotiate.

    Rhysida has a history of targeting public-sector networks, including state and municipal infrastructure.

    Technical considerations:
    • Initial access vector? Phishing vs exposed RDP?
    • Backup segmentation and immutability
    • Insurance-driven IR workflows
    • Data exfiltration + double extortion tactics
    • Public-sector attack surface mapping
    Should smaller governments move toward managed detection and response (MDR) as a baseline requirement?

    Source: therecord.media/cheyenne-arapa

    Share your technical insights below.

    Follow @technadu for advanced ransomware intelligence.

    #Ransomware #ThreatHunting #IncidentResponse #PublicSectorSecurity #CyberResilience #BlueTeam #Infosec #GovTech #DigitalForensics #CyberThreatIntel #DataProtection #SOC #ZeroTrust

  3. The Rhysida ransomware group claims it breached the Cheyenne and Arapaho Tribes, demanding 10 BTC after disrupting education and administrative systems.

    Governor Reggie Wassana confirmed refusal to negotiate.

    Rhysida has a history of targeting public-sector networks, including state and municipal infrastructure.

    Technical considerations:
    • Initial access vector? Phishing vs exposed RDP?
    • Backup segmentation and immutability
    • Insurance-driven IR workflows
    • Data exfiltration + double extortion tactics
    • Public-sector attack surface mapping
    Should smaller governments move toward managed detection and response (MDR) as a baseline requirement?

    Source: therecord.media/cheyenne-arapa

    Share your technical insights below.

    Follow @technadu for advanced ransomware intelligence.

    #Ransomware #ThreatHunting #IncidentResponse #PublicSectorSecurity #CyberResilience #BlueTeam #Infosec #GovTech #DigitalForensics #CyberThreatIntel #DataProtection #SOC #ZeroTrust

  4. The Rhysida ransomware group claims it breached the Cheyenne and Arapaho Tribes, demanding 10 BTC after disrupting education and administrative systems.

    Governor Reggie Wassana confirmed refusal to negotiate.

    Rhysida has a history of targeting public-sector networks, including state and municipal infrastructure.

    Technical considerations:
    • Initial access vector? Phishing vs exposed RDP?
    • Backup segmentation and immutability
    • Insurance-driven IR workflows
    • Data exfiltration + double extortion tactics
    • Public-sector attack surface mapping
    Should smaller governments move toward managed detection and response (MDR) as a baseline requirement?

    Source: therecord.media/cheyenne-arapa

    Share your technical insights below.

    Follow @technadu for advanced ransomware intelligence.

    #Ransomware #ThreatHunting #IncidentResponse #PublicSectorSecurity #CyberResilience #BlueTeam #Infosec #GovTech #DigitalForensics #CyberThreatIntel #DataProtection #SOC #ZeroTrust

  5. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  6. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  7. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  8. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  9. ⚠️ Smishing alert for Greek citizens. 💳 🚨

    Scammers are pushing fake AADE (Independent Authority for Public Revenue) “unpaid taxes” SMS that lead to cloned payment pages designed to steal credit‑card info. If a text suddenly demands urgent payment, treat it like a pop‑up from nowhere—don’t click, don’t trust, don’t pay. Share to protect others.

    mycargr[.]com
    aadcar[.]com
    aadgee[.]com
    aadgre[.]com

    #CyberThreatIntel #Infoblox #DNS #ThreatResearch #phishing #smishing #Cybercrime #AADE #Greece

  10. ⚠️ Smishing alert for Greek citizens. 💳 🚨

    Scammers are pushing fake AADE (Independent Authority for Public Revenue) “unpaid taxes” SMS that lead to cloned payment pages designed to steal credit‑card info. If a text suddenly demands urgent payment, treat it like a pop‑up from nowhere—don’t click, don’t trust, don’t pay. Share to protect others.

    mycargr[.]com
    aadcar[.]com
    aadgee[.]com
    aadgre[.]com

    #CyberThreatIntel #Infoblox #DNS #ThreatResearch #phishing #smishing #Cybercrime #AADE #Greece

  11. ⚠️ Smishing alert for Greek citizens. 💳 🚨

    Scammers are pushing fake AADE (Independent Authority for Public Revenue) “unpaid taxes” SMS that lead to cloned payment pages designed to steal credit‑card info. If a text suddenly demands urgent payment, treat it like a pop‑up from nowhere—don’t click, don’t trust, don’t pay. Share to protect others.

    mycargr[.]com
    aadcar[.]com
    aadgee[.]com
    aadgre[.]com

    #CyberThreatIntel #Infoblox #DNS #ThreatResearch #phishing #smishing #Cybercrime #AADE #Greece

  12. ⚠️ Smishing alert for Greek citizens. 💳 🚨

    Scammers are pushing fake AADE (Independent Authority for Public Revenue) “unpaid taxes” SMS that lead to cloned payment pages designed to steal credit‑card info. If a text suddenly demands urgent payment, treat it like a pop‑up from nowhere—don’t click, don’t trust, don’t pay. Share to protect others.

    mycargr[.]com
    aadcar[.]com
    aadgee[.]com
    aadgre[.]com

    #CyberThreatIntel #Infoblox #DNS #ThreatResearch #phishing #smishing #Cybercrime #AADE #Greece

  13. ⚠️ Smishing alert for Greek citizens. 💳 🚨

    Scammers are pushing fake AADE (Independent Authority for Public Revenue) “unpaid taxes” SMS that lead to cloned payment pages designed to steal credit‑card info. If a text suddenly demands urgent payment, treat it like a pop‑up from nowhere—don’t click, don’t trust, don’t pay. Share to protect others.

    mycargr[.]com
    aadcar[.]com
    aadgee[.]com
    aadgre[.]com

    #CyberThreatIntel #Infoblox #DNS #ThreatResearch #phishing #smishing #Cybercrime #AADE #Greece

  14. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

    👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
    💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

    Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

    #ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

  15. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

    👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
    💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

    Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

    #ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

  16. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

    👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
    💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

    Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

    #ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

  17. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

    👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
    💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

    Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

    #ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

  18. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

    👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
    💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

    Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

    #ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

  19. When your "privacy browser" comes with a built-in surveillance suite, it's probably not about privacy.  Our latest research, in collaboration with UNODC, exposes Vault Viper. You might recognize them as "Baoying Group". They are running one of Asia's largest iGaming networks, BBIN, servicing scam centres and cyber-enabled fraud networks across the region.

    At the center is the Universe Browser, promoted as a "privacy" and "anti-censorship" tool for illegal online gambling. In reality, it's a high-risk surveillance and exploitation platform designed to bypass detections, proxy access, and maintain persistent access across what we estimate to be millions of devices.

    DNS analysis from Infoblox reveals tens of thousands of domains tied to Vault Viper's vast infrastructure, exposing a unique DNS fingerprint and operational control over their own corner of the internet.

    But the story does not end here:  BBIN is linked to dozens of commercial ventures - they even had their own airline !  

    👉 Read the full report here : blogs.infoblox.com/threat-inte

    👉 We spoke to Wired to explain how cybercrime evolved : wired.com/story/universe-brows

    #CyberThreatIntel #Infoblox #DNS #VaultViper #riskware #Cybercrime #SoutheastAsia #threatintel #threatintelligence #cybersecurity #infosec #infobloxthreatintel #scam #tds #shazhupan #pigbutchering #malware

  20. When your "privacy browser" comes with a built-in surveillance suite, it's probably not about privacy.  Our latest research, in collaboration with UNODC, exposes Vault Viper. You might recognize them as "Baoying Group". They are running one of Asia's largest iGaming networks, BBIN, servicing scam centres and cyber-enabled fraud networks across the region.

    At the center is the Universe Browser, promoted as a "privacy" and "anti-censorship" tool for illegal online gambling. In reality, it's a high-risk surveillance and exploitation platform designed to bypass detections, proxy access, and maintain persistent access across what we estimate to be millions of devices.

    DNS analysis from Infoblox reveals tens of thousands of domains tied to Vault Viper's vast infrastructure, exposing a unique DNS fingerprint and operational control over their own corner of the internet.

    But the story does not end here:  BBIN is linked to dozens of commercial ventures - they even had their own airline !  

    👉 Read the full report here : blogs.infoblox.com/threat-inte

    👉 We spoke to Wired to explain how cybercrime evolved : wired.com/story/universe-brows

    #CyberThreatIntel #Infoblox #DNS #VaultViper #riskware #Cybercrime #SoutheastAsia #threatintel #threatintelligence #cybersecurity #infosec #infobloxthreatintel #scam #tds #shazhupan #pigbutchering #malware

  21. When your "privacy browser" comes with a built-in surveillance suite, it's probably not about privacy.  Our latest research, in collaboration with UNODC, exposes Vault Viper. You might recognize them as "Baoying Group". They are running one of Asia's largest iGaming networks, BBIN, servicing scam centres and cyber-enabled fraud networks across the region.

    At the center is the Universe Browser, promoted as a "privacy" and "anti-censorship" tool for illegal online gambling. In reality, it's a high-risk surveillance and exploitation platform designed to bypass detections, proxy access, and maintain persistent access across what we estimate to be millions of devices.

    DNS analysis from Infoblox reveals tens of thousands of domains tied to Vault Viper's vast infrastructure, exposing a unique DNS fingerprint and operational control over their own corner of the internet.

    But the story does not end here:  BBIN is linked to dozens of commercial ventures - they even had their own airline !  

    👉 Read the full report here : blogs.infoblox.com/threat-inte

    👉 We spoke to Wired to explain how cybercrime evolved : wired.com/story/universe-brows

    #CyberThreatIntel #Infoblox #DNS #VaultViper #riskware #Cybercrime #SoutheastAsia #threatintel #threatintelligence #cybersecurity #infosec #infobloxthreatintel #scam #tds #shazhupan #pigbutchering #malware

  22. When your "privacy browser" comes with a built-in surveillance suite, it's probably not about privacy.  Our latest research, in collaboration with UNODC, exposes Vault Viper. You might recognize them as "Baoying Group". They are running one of Asia's largest iGaming networks, BBIN, servicing scam centres and cyber-enabled fraud networks across the region.

    At the center is the Universe Browser, promoted as a "privacy" and "anti-censorship" tool for illegal online gambling. In reality, it's a high-risk surveillance and exploitation platform designed to bypass detections, proxy access, and maintain persistent access across what we estimate to be millions of devices.

    DNS analysis from Infoblox reveals tens of thousands of domains tied to Vault Viper's vast infrastructure, exposing a unique DNS fingerprint and operational control over their own corner of the internet.

    But the story does not end here:  BBIN is linked to dozens of commercial ventures - they even had their own airline !  

    👉 Read the full report here : blogs.infoblox.com/threat-inte

    👉 We spoke to Wired to explain how cybercrime evolved : wired.com/story/universe-brows

    #CyberThreatIntel #Infoblox #DNS #VaultViper #riskware #Cybercrime #SoutheastAsia #threatintel #threatintelligence #cybersecurity #infosec #infobloxthreatintel #scam #tds #shazhupan #pigbutchering #malware

  23. When your "privacy browser" comes with a built-in surveillance suite, it's probably not about privacy.  Our latest research, in collaboration with UNODC, exposes Vault Viper. You might recognize them as "Baoying Group". They are running one of Asia's largest iGaming networks, BBIN, servicing scam centres and cyber-enabled fraud networks across the region.

    At the center is the Universe Browser, promoted as a "privacy" and "anti-censorship" tool for illegal online gambling. In reality, it's a high-risk surveillance and exploitation platform designed to bypass detections, proxy access, and maintain persistent access across what we estimate to be millions of devices.

    DNS analysis from Infoblox reveals tens of thousands of domains tied to Vault Viper's vast infrastructure, exposing a unique DNS fingerprint and operational control over their own corner of the internet.

    But the story does not end here:  BBIN is linked to dozens of commercial ventures - they even had their own airline !  

    👉 Read the full report here : blogs.infoblox.com/threat-inte

    👉 We spoke to Wired to explain how cybercrime evolved : wired.com/story/universe-brows

    #CyberThreatIntel #Infoblox #DNS #VaultViper #riskware #Cybercrime #SoutheastAsia #threatintel #threatintelligence #cybersecurity #infosec #infobloxthreatintel #scam #tds #shazhupan #pigbutchering #malware

  24. ⚠️ LunoBotnet: A modular Linux botnet with cryptomining + DDoS-for-hire.
    ✔️ Self-healing watchdogs
    ✔️ System binary replacement
    ✔️ Targets Roblox, Minecraft, Valve
    ✔️ Markets services via Telegram
    Experts call it a criminal infrastructure platform for long-term monetization.

    💬 How do you rate the detection difficulty here? Follow @technadu for analysis.

    #Cyble #LunoBotnet #LinuxMalware #Cryptojacking #DDoS #Botnet #SelfHealing #Malware #CyberThreatIntel

  25. ⚠️ LunoBotnet: A modular Linux botnet with cryptomining + DDoS-for-hire.
    ✔️ Self-healing watchdogs
    ✔️ System binary replacement
    ✔️ Targets Roblox, Minecraft, Valve
    ✔️ Markets services via Telegram
    Experts call it a criminal infrastructure platform for long-term monetization.

    💬 How do you rate the detection difficulty here? Follow @technadu for analysis.

    #Cyble #LunoBotnet #LinuxMalware #Cryptojacking #DDoS #Botnet #SelfHealing #Malware #CyberThreatIntel

  26. @darfplatypus #CyberThreatIntel requirements gathering is a real emotional roller coaster. Sympathy with the customer, agreeing it would be great knowing the answers to those questions, knowing they cannot be answered with science / known algorithms / one universe worth of energy ... 🙇🏻‍♀️🤦🏻‍♀️

  27. @darfplatypus #CyberThreatIntel requirements gathering is a real emotional roller coaster. Sympathy with the customer, agreeing it would be great knowing the answers to those questions, knowing they cannot be answered with science / known algorithms / one universe worth of energy ... 🙇🏻‍♀️🤦🏻‍♀️

  28. @darfplatypus #CyberThreatIntel requirements gathering is a real emotional roller coaster. Sympathy with the customer, agreeing it would be great knowing the answers to those questions, knowing they cannot be answered with science / known algorithms / one universe worth of energy ... 🙇🏻‍♀️🤦🏻‍♀️

  29. @darfplatypus #CyberThreatIntel requirements gathering is a real emotional roller coaster. Sympathy with the customer, agreeing it would be great knowing the answers to those questions, knowing they cannot be answered with science / known algorithms / one universe worth of energy ... 🙇🏻‍♀️🤦🏻‍♀️

  30. @darfplatypus #CyberThreatIntel requirements gathering is a real emotional roller coaster. Sympathy with the customer, agreeing it would be great knowing the answers to those questions, knowing they cannot be answered with science / known algorithms / one universe worth of energy ... 🙇🏻‍♀️🤦🏻‍♀️

  31. A major leak has revealed the operations behind North Korea’s state-linked IT workforce.

    Slack logs and spreadsheets show how coders apply for remote gigs worldwide, sending back an estimated $600M/year to fund a heavily sanctioned regime.

    #NorthKorea #CyberThreatIntel #Infostealers #sanctionsevasion #APT

  32. A major leak has revealed the operations behind North Korea’s state-linked IT workforce.

    Slack logs and spreadsheets show how coders apply for remote gigs worldwide, sending back an estimated $600M/year to fund a heavily sanctioned regime.

    #NorthKorea #CyberThreatIntel #Infostealers #sanctionsevasion #APT

  33. 🦊 ThreatFox Update | We're now expiring IOCs older than 6 months. IOCs don’t last forever and internet infrastructure often gets re-used, therefore we're implementing a 6-month expiry policy to reduce false positives.

    As a result, expired IOCs will no longer appear in ThreatFox exports or be available via the ThreatFox APIs. Thanks for your continued support! 🙏

    #ThreatFox #IOC #CyberThreatIntel

  34. 🦊 ThreatFox Update | We're now expiring IOCs older than 6 months. IOCs don’t last forever and internet infrastructure often gets re-used, therefore we're implementing a 6-month expiry policy to reduce false positives.

    As a result, expired IOCs will no longer appear in ThreatFox exports or be available via the ThreatFox APIs. Thanks for your continued support! 🙏

    #ThreatFox #IOC #CyberThreatIntel

  35. 🦊 ThreatFox Update | We're now expiring IOCs older than 6 months. IOCs don’t last forever and internet infrastructure often gets re-used, therefore we're implementing a 6-month expiry policy to reduce false positives.

    As a result, expired IOCs will no longer appear in ThreatFox exports or be available via the ThreatFox APIs. Thanks for your continued support! 🙏

    #ThreatFox #IOC #CyberThreatIntel

  36. 🦊 ThreatFox Update | We're now expiring IOCs older than 6 months. IOCs don’t last forever and internet infrastructure often gets re-used, therefore we're implementing a 6-month expiry policy to reduce false positives.

    As a result, expired IOCs will no longer appear in ThreatFox exports or be available via the ThreatFox APIs. Thanks for your continued support! 🙏

    #ThreatFox #IOC #CyberThreatIntel

  37. 🦊 ThreatFox Update | We're now expiring IOCs older than 6 months. IOCs don’t last forever and internet infrastructure often gets re-used, therefore we're implementing a 6-month expiry policy to reduce false positives.

    As a result, expired IOCs will no longer appear in ThreatFox exports or be available via the ThreatFox APIs. Thanks for your continued support! 🙏

    #ThreatFox #IOC #CyberThreatIntel

  38. 🌟 Special Guest Speaker: Lea Cure 🌟
    We are thrilled to have Lea Cure, the esteemed leader of the Cyber Threat Intelligence team at Citizens Bank, join us to share her expertise. With a master's degree in digital forensics, cybersecurity, and intelligence, Lea brings a wealth of knowledge and experience to the table. Her background includes valuable contributions as a former member of Recorded Future's research division, the Insikt Group. Lea is also a passionate advocate for promoting women in cybersecurity and intelligence fields.

    #CyberThreatIntel #OSINT

  39. 🌟 Special Guest Speaker: Lea Cure 🌟
    We are thrilled to have Lea Cure, the esteemed leader of the Cyber Threat Intelligence team at Citizens Bank, join us to share her expertise. With a master's degree in digital forensics, cybersecurity, and intelligence, Lea brings a wealth of knowledge and experience to the table. Her background includes valuable contributions as a former member of Recorded Future's research division, the Insikt Group. Lea is also a passionate advocate for promoting women in cybersecurity and intelligence fields.

    #CyberThreatIntel #OSINT

  40. 🌟 Special Guest Speaker: Lea Cure 🌟
    We are thrilled to have Lea Cure, the esteemed leader of the Cyber Threat Intelligence team at Citizens Bank, join us to share her expertise. With a master's degree in digital forensics, cybersecurity, and intelligence, Lea brings a wealth of knowledge and experience to the table. Her background includes valuable contributions as a former member of Recorded Future's research division, the Insikt Group. Lea is also a passionate advocate for promoting women in cybersecurity and intelligence fields.

    #CyberThreatIntel #OSINT

  41. 🌟 Special Guest Speaker: Lea Cure 🌟
    We are thrilled to have Lea Cure, the esteemed leader of the Cyber Threat Intelligence team at Citizens Bank, join us to share her expertise. With a master's degree in digital forensics, cybersecurity, and intelligence, Lea brings a wealth of knowledge and experience to the table. Her background includes valuable contributions as a former member of Recorded Future's research division, the Insikt Group. Lea is also a passionate advocate for promoting women in cybersecurity and intelligence fields.

    #CyberThreatIntel #OSINT

  42. 🌟 Special Guest Speaker: Lea Cure 🌟
    We are thrilled to have Lea Cure, the esteemed leader of the Cyber Threat Intelligence team at Citizens Bank, join us to share her expertise. With a master's degree in digital forensics, cybersecurity, and intelligence, Lea brings a wealth of knowledge and experience to the table. Her background includes valuable contributions as a former member of Recorded Future's research division, the Insikt Group. Lea is also a passionate advocate for promoting women in cybersecurity and intelligence fields.

    #CyberThreatIntel #OSINT

  43. This project has been created to serve the needs of the international Cyber Threat Intelligence community for a library of their collective past achievements in the realm of CTI reporting. Over time, the goal is to collect a complete corpus of all publicly released CTI reports to be used as a reference in scientific research and CTI reporting.

    #CTI #CyberThreatIntel #Research #Scientific #Community #Reporting
    orkl.eu/about

  44. This project has been created to serve the needs of the international Cyber Threat Intelligence community for a library of their collective past achievements in the realm of CTI reporting. Over time, the goal is to collect a complete corpus of all publicly released CTI reports to be used as a reference in scientific research and CTI reporting.

    #CTI #CyberThreatIntel #Research #Scientific #Community #Reporting
    orkl.eu/about