Intelligence Library

Showing
X
results

The Intelligence Library is a collection of threat intelligence reports published by various sources in the private sector, public sector, law enforcement, and academia. Links for these reports will take you directly to the report instead of a marketing landing page.

See something missing? You can suggest reports to add to the library here.

Topics
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Report Title
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Source
Topic(s)
User Context: An Explanatory Variable in Phishing Susceptibility
Date:
7/15/2018
Source:
NIST
Topic(s)
Phishing
The Credential Theft Ecosystem
Date:
7/23/2018
Source:
Blueliv
Topic(s)
Cybercrime
Malware
2018 Internet Organised Crime Threat Assessment
Date:
9/18/2018
Source:
Europol
Topic(s)
Threat Landscape
London Blue: UK-Based Multinational Gang Runs BEC Scams like a Modern Corporation
Date:
12/1/2018
Source:
Agari
Topic(s)
BEC
Cybercrime
Black-market ecosystem: Estimating the cost of “Pwnership”
Date:
12/14/2018
Source:
Deloitte
Topic(s)
Cybercrime
Dark Web
APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign
Date:
2/6/2019
Source:
Recorded Future
Topic(s)
State-Sponsored
How Some Romance Fraud Victims Become Money Mules
Date:
2/9/2019
Source:
BBB
Topic(s)
BEC
Cybercrime
Scarlet Widow: Laundering Stolen Gift Cards Through Online Cryptocurrency Exchanges
Date:
2/27/2019
Source:
Agari
Topic(s)
BEC
Cybercrime
2019 Threat Report
Date:
2/28/2019
Source:
Webroot
Topic(s)
Threat Landscape
Malware
Cybercrime
2018 IC3 Internet Crime Report
Date:
4/22/2019
Source:
FBI
Topic(s)
Threat Landscape
BEC
Cybercrime
The Economy of Credential Stuffing Attacks
Date:
4/25/2019
Source:
Recorded Future
Topic(s)
Cybercrime
Phishing
Dark Web
Review of State and Local Government Ransomware Attacks
Date:
5/10/2019
Source:
Recorded Future
Topic(s)
Ransomware
Cybercrime
Scattered Canary: The Evolution of a West African Cybercriminal Startup Turned BEC Enterprise
Date:
6/5/2019
Source:
Agari
Topic(s)
BEC
Cybercrime
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Date:
6/26/2019
Source:
RiskIQ
Topic(s)
Cybercrime
Phishing
Iranian Threat Actor Amasses Large Cyber Operations Infrastructure Network to Target Saudi Organizations
Date:
6/26/2019
Source:
Recorded Future
Topic(s)
State-Sponsored
BEC Financial Trend Analysis Report
Date:
7/1/2019
Source:
FinCEN
Topic(s)
BEC
Cybercrime
Updated Advisory on Email Compromise Fraud Schemes Targeting Vulnerable Business Processes
Date:
7/16/2019
Source:
FinCEN
Topic(s)
BEC
Cybercrime
Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum
Date:
7/24/2019
Source:
Recorded Future
Topic(s)
Malware
Cybercrime
Dark Web
Cybercrime Tactics and Techniques: Ransomware Retrospective
Date:
8/1/2019
Source:
Malwarebytes
Topic(s)
Ransomware
Malware
Cybercrime
Crimeware in the Modern Era: A Cost We Cannot Ignore
Date:
9/5/2019
Source:
Chronicle
Topic(s)
Cybercrime
Malware
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists
Date:
9/16/2019
Source:
Academic
Topic(s)
Phishing
The Explosion of Business Email Compromise (BEC) Scams
Date:
9/25/2019
Source:
BBB
Topic(s)
BEC
Cybercrime
Silent Starling: The Emergence of Vendor Email Compromise
Date:
10/2/2019
Source:
Agari
Topic(s)
BEC
Cybercrime
2019 Internet Organised Crime Threat Assessment
Date:
10/9/2019
Source:
Europol
Topic(s)
Threat Landscape
Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs
Date:
12/12/2019
Source:
Recorded Future
Topic(s)
State-Sponsored

Whoops.. There are no results found.