Intel 471 (@intel471inc) 's Twitter Profile
Intel 471

@intel471inc

Your Voice of Reason and Truth

ID: 2524569404

linkhttp://intel471.com calendar_today26-05-2014 09:10:48

1,1K Tweet

8,8K Followers

243 Following

Intel 471 (@intel471inc) 's Twitter Profile Photo

Live on May 14 @ 12 PM ET: Intel 471’s Level 2 Execution Threat Hunting Workshop. Refine your skills in a guided, hands-on session using real data, threat intel, and tools you keep. Earn your certification badge. Register now: hubs.la/Q03l5fVB0 #threathunting

Live on May 14 @ 12 PM ET: Intel 471’s Level 2 Execution Threat Hunting Workshop. Refine your skills in a guided, hands-on session using real data, threat intel, and tools you keep. Earn your certification badge.

Register now: hubs.la/Q03l5fVB0

#threathunting
Intel 471 (@intel471inc) 's Twitter Profile Photo

In this live episode of Out of the Woods, we’ll examine threat actor behavior from initial access to impact. Techniques, targeting, and decisions will be revealed as we go, with the actor named at the end. Join us: hubs.ly/Q03ljLQf0 #threathunting #cybersecurity

In this live episode of Out of the Woods, we’ll examine threat actor behavior from initial access to impact. Techniques, targeting, and decisions will be revealed as we go, with the actor named at the end. Join us: hubs.ly/Q03ljLQf0

#threathunting #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

In this Studio 471 episode, Tom Bolitho of FTI Consulting joins Intel 471’s Jeremy Kirk to share how organizations can manage public scrutiny, media pressure, and data leaks during a crisis. Tune in: hubs.la/Q03lJmF10 #threatintelligence #cybersecurity #threathunting

Intel 471 (@intel471inc) 's Twitter Profile Photo

Join Intel 471's Level 2 Threat Hunting Workshop on Execution tomorrow, May 14 from 12 - 1 PM EDT. Investigate PowerShell abuse, LOLBins, macro payloads, and more using real-world data. Finish the challenge, earn your #threathunting badge. Register now: hubs.la/Q03m5Z1H0

Join Intel 471's Level 2 Threat Hunting Workshop on Execution tomorrow, May 14 from 12 - 1 PM EDT. Investigate PowerShell abuse, LOLBins, macro payloads, and more using real-world data. Finish the challenge, earn your #threathunting badge.

Register now: hubs.la/Q03m5Z1H0
Intel 471 (@intel471inc) 's Twitter Profile Photo

Threat hunting only works when teams do. Join Scott Poley tomorrow at 12 PM ET for a workshop on improving collaboration across Intel, SecOps, and Engineering. Certificate in Cross-Team Collaboration included. Sign up: hubs.la/Q03pfwZr0

Threat hunting only works when teams do. Join Scott Poley tomorrow at 12 PM ET for a workshop on improving collaboration across Intel, SecOps, and Engineering. Certificate in Cross-Team Collaboration included. Sign up: hubs.la/Q03pfwZr0
Intel 471 (@intel471inc) 's Twitter Profile Photo

Strong hunting programs rely on coordination. Join Intel 471’s Scott Poley tomorrow at 12 PM ET to learn how to align threat hunting with Intel, SecOps, and Engineering. Includes a certificate in Cross-Team Collaboration. Sign up: hubs.la/Q03pCmyS0 #threathunting

Strong hunting programs rely on coordination. Join Intel 471’s Scott Poley tomorrow at 12 PM ET to learn how to align threat hunting with Intel, SecOps, and Engineering. Includes a certificate in Cross-Team Collaboration. Sign up: hubs.la/Q03pCmyS0

#threathunting
Intel 471 (@intel471inc) 's Twitter Profile Photo

Learn how to structure threat hunting to support Intel, SecOps, and Engineering. Join Intel 471’s Scott Poley tomorrow at 12 PM ET for our next management workshop. Certificate awarded on completion. Sign up: hubs.la/Q03pfl5v0 #threathunting #cybersecurity

Learn how to structure threat hunting to support Intel, SecOps, and Engineering. Join Intel 471’s Scott Poley tomorrow at 12 PM ET for our next management workshop. Certificate awarded on completion. Sign up: hubs.la/Q03pfl5v0

#threathunting #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

AI is changing how threat hunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how AI is used in real workflows, where it adds value, and where it falls short. Register: hubs.la/Q03sxG8q0 #threathunting #cybersecurity

AI is changing how threat hunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how AI is used in real workflows, where it adds value, and where it falls short. Register: hubs.la/Q03sxG8q0

#threathunting #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

#DragonForce ransomware affiliates used registry changes to maintain persistence before launching attacks. This case study shows how threat hunters can detect the technique early using behavioral hunting, not just IOCs: hubs.la/Q03t88ff0 #threathunting #CTI #cybersecurity

Intel 471 (@intel471inc) 's Twitter Profile Photo

CTI teams are under pressure to mature fast. In this #SANS webcast, Intel 471’s Ashley Jess shares insights on integrating #geopolitics and measuring CTI value using frameworks like CTI-CMM & CU-GIRH. Watch the full discussion: hubs.la/Q03tbg-t0 #CTI #cybersecurity

Intel 471 (@intel471inc) 's Twitter Profile Photo

🚨 EMERGING THREAT: MOMMY ACCESS BROKER Leaked guide linked to mommy reveals how this actor exploits CVEs and sells access to high-value targets like governments and telecoms. 🔗 Read the full report: hubs.la/Q03v1Bkn0 #threatintel #cybersecurity #threathunting

🚨 EMERGING THREAT: MOMMY ACCESS BROKER
Leaked guide linked to mommy reveals how this actor exploits CVEs and sells access to high-value targets like governments and telecoms.

🔗 Read the full report: hubs.la/Q03v1Bkn0

#threatintel #cybersecurity #threathunting
Intel 471 (@intel471inc) 's Twitter Profile Photo

How are #threathunting teams actually using AI? On July 10, we’re going live with a technical discussion on what #AI enables, what problems it creates, and how teams are adapting. Register & join the conversation: hubs.la/Q03vgnz60 #cybersecurity #threatintel

How are #threathunting teams actually using AI? On July 10, we’re going live with a technical discussion on what #AI enables, what problems it creates, and how teams are adapting. Register & join the conversation: hubs.la/Q03vgnz60

#cybersecurity #threatintel
Intel 471 (@intel471inc) 's Twitter Profile Photo

How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: hubs.la/Q03w49-h0 #cybersecurity #CTI

How do #malware behaviors inform hunt strategy? Find out July 31 in Intel 471’s live, hands-on workshop. Real telemetry, real IOAs, guided by our #threatintel and #threathunting teams. Sign up: hubs.la/Q03w49-h0

#cybersecurity #CTI
Intel 471 (@intel471inc) 's Twitter Profile Photo

Ransomware, phishing, and supply chain attacks are hitting the #automotiveindustry harder each year. Our latest report breaks down the top #cyberthreats and what security teams need to know: hubs.la/Q03w4q9x0 #threatintel #cybersecurity

Ransomware, phishing, and supply chain attacks are hitting the #automotiveindustry harder each year. Our latest report breaks down the top #cyberthreats and what security teams need to know: hubs.la/Q03w4q9x0

#threatintel #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

AI is changing how #threathunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how #AI is used in real workflows, where it adds value, and where it falls short. Register: hubs.la/Q03w4g560 #threathunting #cybersecurity

AI is changing how #threathunters work, but not always in expected ways. Join us July 10 for a live Out of the Woods episode on how #AI is used in real workflows, where it adds value, and where it falls short. Register: hubs.la/Q03w4g560

#threathunting #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

Executives are taking a larger role in #CTI priorities. Our new brief breaks down key findings from the SANS 2025 Survey and how CTI teams can better support business risk decisions. Download here: hubs.la/Q03w4nnx0 #cyberrisk #threatintel #SANS2025

Executives are taking a larger role in #CTI priorities. Our new brief breaks down key findings from the SANS 2025 Survey and how CTI teams can better support business risk decisions. Download here: hubs.la/Q03w4nnx0

#cyberrisk #threatintel #SANS2025
Intel 471 (@intel471inc) 's Twitter Profile Photo

Threat hunting finds what detection misses. Intel 471's new paper explains how CISOs are using intelligence-driven hunts to reduce dwell time and stay ahead of persistent threats. Read more: hubs.la/Q03xxtyt0 #cybersecurity #threathunting #cybercrime #threatintel

Threat hunting finds what detection misses. Intel 471's new paper explains how CISOs are using intelligence-driven hunts to reduce dwell time and stay ahead of persistent threats.

Read more: hubs.la/Q03xxtyt0

#cybersecurity #threathunting #cybercrime #threatintel
Intel 471 (@intel471inc) 's Twitter Profile Photo

Intel 471’s next #threathunting workshop zeroes in on #malware. Join us July 31 at 11 AM ET to explore how malware behaviors reveal adversary intent and how to hunt them in live environments: hubs.la/Q03y3_4f0 #threatintel #cybersecurity #CTI

Intel 471’s next #threathunting workshop zeroes in on #malware. Join us July 31 at 11 AM ET to explore how malware behaviors reveal adversary intent and how to hunt them in live environments: hubs.la/Q03y3_4f0

#threatintel #cybersecurity #CTI
Intel 471 (@intel471inc) 's Twitter Profile Photo

FileFix abuses File Explorer's address bar by tricking users into pasting clipboard commands that silently run malware. Read the full report: hubs.la/Q03y-xYz0 #threathunting #emergingthreat #cybersecurity

FileFix abuses File Explorer's address bar by tricking users into pasting clipboard commands that silently run malware.
Read the full report: hubs.la/Q03y-xYz0

#threathunting #emergingthreat #cybersecurity
Intel 471 (@intel471inc) 's Twitter Profile Photo

Tomorrow: Intel 471’s malware-focused #threathunting workshop. Join us at 11:00 AM ET for a live session built around real #threatintel, guided hunting, and a final challenge to earn your badge. Register: hubs.la/Q03z7j8d0 #cybersecurity #CTI #malware

Tomorrow: Intel 471’s malware-focused #threathunting workshop.

Join us at 11:00 AM ET for a live session built around real #threatintel, guided hunting, and a final challenge to earn your badge. Register: hubs.la/Q03z7j8d0

#cybersecurity #CTI #malware