Combatting Deepfakes in the Year of AI Elections
Many governments, organizations and corporations are working to combat deepfake-enabled misinformation, but it’s highly unlikely that any country hosting democratic elections in 2024 will be able to implement safeguards in ti...
Can Deepfakes Bypass Online ID Verifications?
Advances in generative artificial intelligence models are being used to create bogus identities, which will continue to pose challenges for ID verification.
How Cybercriminals Exploit the Hospitality Industry
In the second half of 2023, the hospitality industry was increasingly targeted by spam and social-engineering campaigns that led to malicious software.
Speed and Insight: Intel 471’s Data Leak Blogs Enhancement
Your organization needs timely insight into the information these adversaries have released on their blogs more than ever before. With our latest data leak blog collection enhancement, you can take the preventative action nee...
Targeted Phishing Linked to 'The Com' Surges
Attackers are conducting SMS phishing attacks aimed at collecting login credentials for enterprise accounts. Here’s what we’ve observed.
Vulnerabilities Year-in-Review: 2023
In 2023, threat actors showed increasing interest in zero-day vulnerabilities and recently disclosed ones. Here's our review of the trends and tips for defense.
Intel 471 Products Meet Evolving Cyber Threat Landscape
Over the last year, we made many improvements to our offerings, and we’d like to share a few with you. This article provides a rundown of improvements we’ve recently accomplished aimed at increasing the relevance, speed, and ...
Countering Cyber Extortion and Hacktivism
In this episode of Studio 471, we discuss two areas where Orange Cyberdefense has produced unique research in its Security Navigator 2024 report: cyber extortion and hacktivism. We tackle whether cyber extortion can be deterr...
Cybercrime Exposed Podcast: Crypto Heist
In March 2022, North Korean hackers stole $600 million worth of virtual currency from the online game Axie Infinity. But blockchain investigators were hot on the trail.
Building Capable Threat Intelligence Programs
It's possible to build effective cyber threat intelligence programs with smaller teams, but stakeholder buy-in is important. John Fokker of Trellix describes how security teams can improve their CTI programs.