TOPICS / Threat Intelligence
Threat Intelligence
Track adversaries, techniques, and indicators.
Threat intelligence turns raw data into decisions — which threats matter, what they do, and how to detect them. It spans indicators (IOCs), techniques (TTPs), and the actively-exploited vulnerabilities you must patch first.
These tools and reference hubs are the backbone of practical threat-intel work.
Free tools
Latest coverage
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content
Key terms
Threat Intelligence
Indicator of Compromise (IOC)
Advanced Persistent Threat (APT)
Command and Control (C2)
Reference databases