Current space

Members

Filtered creator directory for "threat".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
30Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 1 | 30 shown
A
How To Secure Cloud Compliance | Arctic Wolf
How To Secure Cloud Compliance | Arctic Wolf
Arctic Wolf Threat Research avatar
@Arctic Wolf Threat Research
Arctic Wolf
Apr 19, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How To Secure Cloud Compliance | Arctic Wolf
arcticwolf.com
0Following 0Comments 0Views 0Shares
A
Arista - Edge Threat Management avatar
@Arista - Edge Threat Management
Arista -
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
B
EvilToken: AI-driven phishing on Microsoft 365 users | AppOmni
EvilToken: AI-driven phishing on Microsoft 365 users | AppOmni
Bill Legue, Lead Threat Hunter, AppOmni avatar
@Bill Legue, Lead Threat Hunter, AppOmni
Bill Legue,
Apr 20, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
EvilToken: AI-driven phishing on Microsoft 365 users | AppOmni
appomni.com
0Following 0Comments 0Views 0Shares
C
Terms & Conditions | Center for Threat-Informed Defense
Privacy Policy | Center for Threat-Informed Defense
Attack Flow v3 | Center for Threat-Informed Defense
Terms & Conditions | Center for Threat-Informed Defense
Center for Threat-Informed Defense avatar
@Center for Threat-Informed Defense
Center For
Feb 2, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 40Posts 1Sources 0Reputation
Latest signal 0 reactions
Terms & Conditions | Center for Threat-Informed Defense
ctid.mitre.org
0Following 0Comments 0Views 0Shares
C
Malicious Campaign Targets Android Devices Using Telegram Bots to Steal SMS and OTPs
Malicious Campaign Targets Android Devices Using Telegram Bots to Steal SMS and OTPs
Cyber Threat Post avatar
@Cyber Threat Post
Cyber Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Malicious Campaign Targets Android Devices Using Telegram Bots to Steal SMS and OTPs
varutra.com
0Following 0Comments 0Views 0Shares
E
Elliptic Threat Intel avatar
@Elliptic Threat Intel
Elliptic Threat
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
H
Ultralytics AI Library Hacked via GitHub for Cryptomining | Wiz Blog
Wiz observes CVE-2024-0012 and CVE-2024-9474 exploitation | Wiz Blog
Top Wiz Research Blogs: 2025 | Wiz Blog
Ultralytics AI Library Hacked via GitHub for Cryptomining | Wiz Blog
https://www.wiz.io/authors/wiz-threat-research avatar
@https://www.wiz.io/authors/wiz-threat-research
Https://www.wiz.io/authors/wiz-threat-research User
Feb 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 1Sources 0Reputation
Latest signal 0 reactions
Ultralytics AI Library Hacked via GitHub for Cryptomining | Wiz Blog
wiz.io
0Following 0Comments 0Views 0Shares
I
Infoblox Threat Intel avatar
@Infoblox Threat Intel
Infoblox Threat
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 5Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
K
Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFA
Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFA
KnowBe4 Threat Lab avatar
@KnowBe4 Threat Lab
KnowBe4 Threat
Feb 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFA
blog.knowbe4.com
0Following 0Comments 0Views 0Shares
L
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool | Point Wild
When Malware Talks Back | Point Wild
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool | Point Wild
Lat61 Threat Intelligence Team avatar
@Lat61 Threat Intelligence Team
Lat61 Threat
Feb 3, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool | Point Wild
pointwild.com
0Following 0Comments 0Views 0Shares
M
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
Mauricio Velazco, Splunk Threat Research Team avatar
@Mauricio Velazco, Splunk Threat Research Team
Mauricio Velazco,
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
M
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
Michael Haag, Splunk Threat Research Team avatar
@Michael Haag, Splunk Threat Research Team
Michael Haag,
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Security Insights: Tracking Confluence CVE-2023-22527 | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
M
Microsoft 365 Security, Microsoft Threat Intelligence avatar
@Microsoft 365 Security, Microsoft Threat Intelligence
Microsoft 365
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
M
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 | Microsoft Security Blog
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks | Microsoft Security Blog
Code injection attacks using publicly disclosed ASP.NET machine keys | Microsoft Security Blog
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 | Mi...
Microsoft Threat Intelligence avatar
@Microsoft Threat Intelligence
Microsoft Threat
Apr 30, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 114Posts 1Sources 0Reputation
Latest signal 0 reactions
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
N
NATIONALINSIDERTHREATSIG.ORG avatar
@NATIONALINSIDERTHREATSIG.ORG
NATIONALINSIDERTHREATSIG.ORG User
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
O
OffSeq Threat Intelligence avatar
@OffSeq Threat Intelligence
OffSeq Threat
Jan 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 45Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
R
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor | Microsoft Security Blog
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor | Microsoft Security Blog
Ramin Nafisi, Microsoft Threat Intelligence avatar
@Ramin Nafisi, Microsoft Threat Intelligence
Ramin Nafisi,
Feb 3, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
S
Satori Threat Intelligence and Research Team avatar
@Satori Threat Intelligence and Research Team
Satori Threat
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
S
FIN7 hosting honeypot domains with malicious AI Generators – New Silent Push research - Silent Push
FIN7 hosting honeypot domains with malicious AI Generators – New Silent Push research - S...
Silent Push Threat Team avatar
@Silent Push Threat Team
Silent Push
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 13Posts 1Sources 0Reputation
Latest signal 0 reactions
FIN7 hosting honeypot domains with malicious AI Generators – New Silent Push research - Silent Push
silentpush.com
0Following 0Comments 0Views 0Shares
S
Investigating GSuite Phishing Attacks with Splunk | Splunk
From Water to Wine: An Analysis of WINELOADER | Splunk
Cloud Federated Credential Abuse & Cobalt Strike: Threat Research February 2021 | Splunk
Investigating GSuite Phishing Attacks with Splunk | Splunk
Splunk Threat Research Team avatar
@Splunk Threat Research Team
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 13Posts 1Sources 0Reputation
Latest signal 0 reactions
Investigating GSuite Phishing Attacks with Splunk | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Splunking Isovalent Data: Initial Setup and Overview | Splunk
Splunking Isovalent Data: Initial Setup and Overview | Splunk
Splunk Threat Research Team, Bhavin Patel avatar
@Splunk Threat Research Team, Bhavin Patel
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Splunking Isovalent Data: Initial Setup and Overview | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis | Splunk
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and...
Splunk Threat Research Team, Michael Haag avatar
@Splunk Threat Research Team, Michael Haag
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
S
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata | Splunk
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
Splunk Threat Research Team, Teoderick Contreras avatar
@Splunk Threat Research Team, Teoderick Contreras
Splunk Threat
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware | Splunk
splunk.com
0Following 0Comments 0Views 0Shares
T
When Supply-Chain Attacks Meet CI/CD Infrastructures - VMware Security Blog - VMware
When Supply-Chain Attacks Meet CI/CD Infrastructures - VMware Security Blog - VMware
Threat Analysis Unit avatar
@Threat Analysis Unit
Threat Analysis
Apr 19, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 5Posts 1Sources 0Reputation
Latest signal 0 reactions
When Supply-Chain Attacks Meet CI/CD Infrastructures - VMware Security Blog - VMware
blogs.vmware.com
0Following 0Comments 0Views 0Shares
T
Frontline security predictions 2026: The phishing techniques to prepare for | Barracuda Networks Blog
Frontline security predictions 2026: The phishing techniques to prepare for | Barracuda Net...
Threat Analyst Team avatar
@Threat Analyst Team
Threat Analyst
Apr 6, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Frontline security predictions 2026: The phishing techniques to prepare for | Barracuda Networks Blog
blog.barracuda.com
0Following 0Comments 0Views 0Shares
T
Threat Lab avatar
@Threat Lab
Threat Lab
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
T
A first look at the builder for LockBit 3.0 Black - ThreatDown by Malwarebytes
APT34 targets Jordan Government using new Saitama backdoor
Endpoint Detection and Response - ThreatDown von Malwarebytes
A first look at the builder for LockBit 3.0 Black - ThreatDown by Malwarebytes
Threat_Down avatar
@Threat_Down
Threat_Down User
Apr 6, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 102Posts 1Sources 0Reputation
Latest signal 0 reactions
A first look at the builder for LockBit 3.0 Black - ThreatDown by Malwarebytes
threatdown.com
0Following 0Comments 0Views 0Shares
T
Does a BEAR Leak in the Woods? | ThreatConnect
Does a BEAR Leak in the Woods? | ThreatConnect
ThreatConnect avatar
@ThreatConnect
ThreatConnect User
Feb 9, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 8Posts 1Sources 0Reputation
Latest signal 0 reactions
Does a BEAR Leak in the Woods? | ThreatConnect
threatconnect.com
0Following 0Comments 0Views 0Shares
T
Author Behind Ransomware Tox Calls it Quits, Sells Platform | Threatpost
Fake Coronavirus ‘Vaccine’ Website Busted in DoJ Takedown | Threatpost
Critical Zoho Zero-Day Flaw Disclosed | Threatpost
Author Behind Ransomware Tox Calls it Quits, Sells Platform | Threatpost
threatpost avatar
@threatpost
Threatpost User
Apr 30, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 171Posts 1Sources 0Reputation
Latest signal 0 reactions
Author Behind Ransomware Tox Calls it Quits, Sells Platform | Threatpost
threatpost.com
0Following 0Comments 0Views 0Shares
W
WMC Global Cyber Threat Intelligence Team avatar
@WMC Global Cyber Threat Intelligence Team
WMC Global
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares