Endigest logo
Endigest
All Tech BlogsExplore TagsSend Feedback
Newsletter
Endigest logo
Endigest

© 2026 Endigest. All rights reserved.

  • About
  • Privacy
  • Terms
  • Contact
  • RSS

Threat Intelligence Articles

16 articles

Related Tags

Threats(2)
Security(1)
AI(1)
Agents(1)
LLM(1)
Risk Management(1)
Threat Operations(1)
Automation
(1)
Engineering(1)
Threat Data(1)
Digital Forensics(1)
Cloudforce One(1)
Cloudflare logoCloudflare
01 min read
Security•2026-05-18

Project Glasswing: what Mythos showed us

Mythos Preview demonstrates significant advances in security-focused AI, but reveals challenges in consistent safeguards and managing vulnerability finding noise.

Security
AI
Agents
Threat Intelligence
LLM
Risk Management
Threat Operations
Automation
Engineering
Google Cloud logoGoogle Cloud
015 min read
Security•2026-05-15

Welcome to BlackFile: Inside a Vishing Extortion Operation

Google Threat Intelligence Group tracks UNC6671's extortion campaign using voice phishing and SSO compromise.

Threat Intelligence
Google Cloud logoGoogle Cloud
031 min read
Security•2026-05-11

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

This report from Google Threat Intelligence Group (GTIG) documents how adversaries are increasingly leveraging AI models to accelerate their attack capabilities across multiple stages of the threat lifecycle.

Threat Intelligence
Google Cloud logoGoogle Cloud
519 min read
Security•2026-04-23

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Google Threat Intelligence Group identified UNC6692's multistage intrusion combining social engineering, custom malware, and lateral movement.

Threat Intelligence
Google Cloud logoGoogle Cloud
216 min read
Security•2026-04-16

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

This article outlines how AI-powered vulnerability discovery is fundamentally changing the enterprise security landscape and what organizations must do to adapt.

Threat Intelligence
Google Cloud logoGoogle Cloud
37 min read
Security•2026-04-15

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Germany became Europe's primary cyber extortion target in 2025, experiencing 92% growth in data leaks as criminal groups shift focus from English-speaking markets.

Threat Intelligence
Google Cloud logoGoogle Cloud
539 min read
Security•2026-04-02

vSphere and BRICKSTORM Malware: A Defender's Guide

This post provides a defender's framework for securing VMware vSphere environments against BRICKSTORM malware, which establishes persistence at the virtualization layer beneath traditional security tools.

Threat Intelligence
Google Cloud logoGoogle Cloud
1311 min read
Security•2026-03-31

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

Google Threat Intelligence Group (GTIG) details an active supply chain attack on the axios NPM package attributed to North Korea-linked threat actor UNC1069.

Threat Intelligence
Google Cloud logoGoogle Cloud
49 min read
Security•2026-03-23

M-Trends 2026: Data, Insights, and Strategies From the Frontlines

Mandiant's M-Trends 2026 report analyzes over 500,000 hours of frontline incident investigations in 2025, revealing major shifts in adversary tactics and cyber threat trends.

Threat Intelligence
Google Cloud logoGoogle Cloud
225 min read
Security•2026-03-18

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

Google Threat Intelligence Group (GTIG) details DarkSword, a full-chain iOS exploit leveraging six zero-day vulnerabilities, adopted by multiple threat actors since November 2025.

Threat Intelligence
Google Cloud logoGoogle Cloud
452 min read
Security•2026-03-16

Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape

This Mandiant report analyzes the ransomware threat landscape and observed TTPs from 2025 incident response engagements.

Threat Intelligence
Google Cloud logoGoogle Cloud
194 min read
Security•2026-03-06

Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition

This post provides proactive recommendations to defend against destructive cyberattacks, wipers, and modified ransomware.

Threat Intelligence
Google Cloud logoGoogle Cloud
226 min read
Security•2026-03-05

Look What You Made Us Patch: 2025 Zero-Days in Review

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities exploited in-the-wild in 2025, highlighting structural shifts toward enterprise targeting and evolving threat actor techniques.

Threat Intelligence
Google Cloud logoGoogle Cloud
212 min read
Security•2026-03-03

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Google Threat Intelligence Group (GTIG) identified "Coruna," a powerful iOS exploit kit targeting iPhones running iOS 13.0 through 17.2.1, containing 23 exploits across five full exploit chains.

Threat Intelligence
Cloudflare logoCloudflare
131 min read
Security•2026-03-03

Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less

Cloudflare evolved its Threat Intelligence Platform to eliminate ETL pipelines using a sharded, SQLite-backed Durable Objects architecture with GraphQL running at the edge.

Threat Intelligence
Threats
Threat Data
Digital Forensics
Cloudflare logoCloudflare
161 min read
Security•2026-03-03

Introducing the 2026 Cloudflare Threat Report

Cloudflare's 2026 Threat Report details a shift from brute-force attacks to high-trust exploitation, measured by attacker Measure of Effectiveness (MOE).

Threat Intelligence
Cloudforce One
Threats