Intelligence Library

Showing
X
results

The Intelligence Library is a collection of threat intelligence reports published by various sources in the private sector, public sector, law enforcement, and academia. Links for these reports will take you directly to the report instead of a marketing landing page.

See something missing? You can suggest reports to add to the library here.

Topics
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Report Title
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Source
Topic(s)
2015 IC3 Internet Crime Report
Date:
5/1/2016
Source:
FBI
Topic(s)
Threat Landscape
BEC
Cybercrime
Phorecasting Phishing Attacks: A New Approach for Predicting the Appearance of Phishing Websites
Date:
7/1/2016
Source:
Academic
Topic(s)
Phishing
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Date:
9/9/2016
Source:
FinCEN
Topic(s)
BEC
Cybercrime
The French Underground Under a Shroud of Extreme Caution
Date:
9/14/2016
Source:
Trend Micro
Topic(s)
Cybercrime
Dark Web
State Of The Channel Ransomware Report 2016
Date:
9/20/2016
Source:
Datto
Topic(s)
Ransomware
Malware
Cybercrime
The Rising Face of Cybercrime: Ransomware
Date:
9/21/2016
Source:
BitSight
Topic(s)
Ransomware
Malware
Cybercrime
2016 Internet Organised Crime Threat Assessment
Date:
9/27/2016
Source:
Europol
Topic(s)
Threat Landscape
PhishEye: Live Monitoring of Sandboxed Phishing Kits
Date:
10/24/2016
Source:
Academic
Topic(s)
Phishing
Understanding The Use Of Leaked Account Credentials In The Wild
Date:
11/14/2016
Source:
Academic
Topic(s)
Cybercrime
Phishing
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Date:
11/17/2016
Source:
Academic
Topic(s)
Dark Web
Cyber Criminals, College Credentials, and the Dark Web
Date:
3/1/2017
Source:
Digital Citizens Alliance
Topic(s)
Cybercrime
Phishing
Dark Web
Cybercrime in West Africa: Poised for an Underground Market
Date:
3/9/2017
Source:
Trend Micro
Topic(s)
Cybercrime
Two Years of Pawn Storm: Examining an Increasingly Relevant Threat
Date:
4/25/2017
Source:
Trend Micro
Topic(s)
State-Sponsored
Malware
2016 IC3 Internet Crime Report
Date:
6/21/2017
Source:
FBI
Topic(s)
Threat Landscape
BEC
Cybercrime
Ichthyology: Phishing as a Science
Date:
7/26/2017
Source:
Stripe
Topic(s)
Phishing
The Economy Behind the Phishing Websites Creation
Date:
8/1/2017
Source:
Clearsky
Topic(s)
Cybercrime
Phishing
2017 Internet Organised Crime Threat Assessment
Date:
9/27/2017
Source:
Europol
Topic(s)
Threat Landscape
Digital Souks: A Glimpse into Middle Eastern and North African Underground
Date:
10/27/2017
Source:
Trend Micro
Topic(s)
Cybercrime
Dark Web
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
Date:
10/30/2017
Source:
Academic
Topic(s)
Malware
Phishing
Phish in a Barrel: Hunting and Analyzing Phishing Kits at Scale
Date:
10/31/2017
Source:
Duo
Topic(s)
Phishing
Charming Kitten: Iranian Cyber Espionage
Date:
12/5/2017
Source:
Clearsky
Topic(s)
State-Sponsored
Malware
Litecoin Emerges as the Next Dominant Dark Web Currency
Date:
2/8/2018
Source:
Recorded Future
Topic(s)
Cybercrime
Dark Web
Nigerian Contrafraternities Emerge as BEC Threat
Date:
3/20/2018
Source:
Crowdstrike
Topic(s)
BEC
Cybercrime
2017 IC3 Internet Crime Report
Date:
5/7/2018
Source:
FBI
Topic(s)
Threat Landscape
BEC
Cybercrime
Iran’s Hacker Hierarchy Exposed: How the Islamic Republic of Iran Uses Contractors and Universities to Conduct Cyber Operations
Date:
5/9/2018
Source:
Recorded Future
Topic(s)
State-Sponsored

Whoops.. There are no results found.