Where this intelligence comes from
A curated reading list — vendor research, government advisories, academic groups, and threat feeds that drive the rest of this site. Operator infrastructure (leak sites, hacktivist Telegram channels) is included as metadata only: you can see that it exists and which actor it belongs to, but the page deliberately does not render those rows as clickable links.
Vendor blog · 13
Check Point Research
Israeli vendor research with consistent Iran and Hezbollah-adjacent coverage; also strong on mobile-malware ecosystems.
Cisco Talos Intelligence Group
Telemetry-rich technical writeups; particularly strong on ransomware affiliate tracking and exploited-CVE post-mortems drawn from Cisco Secure Endpoint and Umbrella telemetry.
CrowdStrike Blog
Introduced the animal-suffix taxonomy (Cozy Bear, Fancy Bear, Wicked Panda). Annual Global Threat Report is a CTI staple. Heavy presence on eCrime tradecraft and access broker tracking.
Dragos
ICS/OT-focused threat intelligence — the authoritative source on adversary tradecraft against industrial control systems. Their ELECTRUM/CHERNOVITE/VOLTZITE naming covers ICS-targeting groups.
ESET WeLiveSecurity
Slovak vendor with deep reverse-engineering coverage of Industroyer, the GreyEnergy/BlackEnergy lineage, and Ukrainian-targeted destructive malware.
Kaspersky Securelist
Long-running APT research; historically uncovered Equation Group, Duqu, and many post-Soviet-region intrusion sets. Reporting now viewed through a geopolitical lens but the technical depth on implant analysis remains valuable.
Mandiant (Google Cloud) Blog
Long-form intrusion writeups and APT attribution from the firm behind the original APT1 report (2013). Authoritative on China-nexus and Iran-nexus tracking; introduced the 'APTn' and 'UNCn' naming schemes the rest of the industry adopted.
Microsoft Threat Intelligence
Output from MSTIC (Microsoft Threat Intelligence Center) and the Digital Crimes Unit. Owns the weather-themed naming taxonomy (Volt Typhoon, Midnight Blizzard, Forest Blizzard). Strong on identity-provider abuse, BEC, and cloud-native intrusion.
Palo Alto Networks · Unit 42
Telemetry-driven research from Palo Alto Networks. Routinely publishes detailed actor profiles and IR narratives; strong Middle-East-nexus coverage.
Recorded Future · Insikt Group
Strategic CTI with strong influence-operations and infrastructure-tracking coverage. Notable for sustained tracking of Chinese MSS contractors and Russian disinformation ecosystem.
SentinelLabs
SentinelOne's research arm. Strong reverse-engineering depth on macOS-targeting threats, North Korean tooling, and Russian destructive-malware families.
Trend Micro Research
Broad telemetry from Asia-Pacific deployments. Often first with Chinese and Southeast-Asian threat-actor reporting (Earth-prefix naming taxonomy).
Volexity
Boutique IR firm with disproportionate influence on zero-day discovery (Microsoft Exchange ProxyShell, Ivanti Connect Secure). Reports tend to land first on novel state-sponsored exploitation.
Government advisory · 7
ANSSI (France) CERT-FR
French national agency. Strong on EU diplomatic targeting and Russian-linked intrusion-set tracking; bilingual reports.
BSI (Germany) Cyber-Sicherheitswarnungen
Germany's federal cyber agency. Strong on industrial-base targeting and EU-coordinated advisory work.
CERT-UA
State Cyber Protection Centre of Ukraine. Operational front line: routinely first to publish on Sandworm/APT28 destructive and disruptive operations.
CISA Cybersecurity Advisories
U.S. CISA's joint-advisory series (AAxx-NNNa) — typically co-signed with FBI/NSA and partner Five Eyes / EU agencies. The single most important defender-facing source on named-actor tradecraft and IOCs.
JPCERT/CC
Japanese national CERT. Frequently first-to-publish on China-and DPRK-nexus campaigns targeting Asia-Pacific organizations; translates significant reports to English.
KrCERT/CC (KISA)
South Korea's national CERT under KISA. Authoritative on DPRK tradecraft against Korean targets.
UK NCSC Threat Reports
UK National Cyber Security Centre. Formal attribution carries intelligence-community weight; co-signs many CISA joint advisories.
Researcher · 3
The DFIR Report
Detailed end-to-end intrusion narratives reconstructed from real engagements. Ideal for detection engineers — every report ends with an IOC pack and Sigma rule references.
ThreatDown by Malwarebytes
Consumer-facing but technically rigorous; strong ransomware and stealer-malware coverage.
vx-underground
Independent malware-archive project; mirrors leak-site dumps and ransomware brand portals as research artifacts. Frequent first-publisher of leaked operator chats and source code.
Academic / policy · 3
Atlantic Council DFRLab
Influence-operations-focused research; strong on the intersection of cyber and information operations from Russia, China, and Iran.
Citizen Lab
University of Toronto research lab — definitive coverage of mercenary spyware (NSO Group/Pegasus, Candiru, QuaDream) and state-sponsored targeting of journalists and dissidents.
CSIS · Strategic Technologies Program
Maintains the Significant Cyber Incidents list — high-signal running chronology of state-attributed events going back to 2006.
Podcast / news · 3
BleepingComputer
Beat-reporter cybersecurity news. Often the public confirmation channel for ransomware victim disclosures and brand-new strain discovery.
KrebsOnSecurity
Brian Krebs — long-form investigative work on cybercrime ecosystems and operator unmasking.
Risky Business · podcast & newsletter
Patrick Gray's weekly briefing — the dominant CTI/defender industry podcast. Strong attribution-curious analysis.
Threat feed · 3
abuse.ch
Operates URLhaus, MalwareBazaar, ThreatFox, Feodo Tracker, and YARAify. Free, high-quality IOC feeds widely consumed in MISP and OpenCTI deployments.
eCrimeGroup statistics
Per-brand ransomware victim counts and timelines, useful for benchmarking which RaaS operations are growing or in decline.
Ransomware.live
Aggregated ransomware leak-site monitor — surfaces victim claims across active brands without the visitor having to touch the underlying Tor sites. Best public source for tracking ransomware activity in aggregate.
Leak site · 4
Akira leak site
Akira's data-leak site, distinguished by the deliberately retro 1980s-terminal-styled web UI.
CL0P^_- LEAKS
Cl0p's data-leak site — operationally relevant when triaging MOVEit-era and GoAnywhere-era exposure of customer data.
LockBit DLS (post-Cronos shell)
LockBit's operator brand attempted to relaunch a leak site after the February 2024 NCA seizure. Activity since the Khoroshev indictment is largely posturing / re-uploads.
Play leak site
Play ransomware's data-leak site; the brand is a closed group (no public RaaS affiliate program) so victim posts are the primary public signal of operations.
Telegram channel · 3
CyberAv3ngers public Telegram
IRGC-linked persona's claim channel for Unitronics PLC defacements and similar operations against water and wastewater utilities.
KillNet-aligned Telegram channels
KillNet's brand has fragmented; the original channels were removed and successor channels emerge under near-identical names. Operationally relevant for tracking pro-Russia DDoS campaign timing.
NoName057(16) public Telegram channels
DDoSia targeting list, victim claims, and recruitment posts. Channels rotate frequently after Telegram takedowns. The English-language channel mirrors the Russian-language original.