https://www.infoblox.com/threat-intel/threat-actors/hazy-hawk/
Hazy Hawk: Domain Hijacking Threat Actor - Infoblox
Dec 11, 2025 - Learn about Hazy Hawk, the first reporting of an actor hijacking dangling CNAMES in abandoned cloud resources.
domain hijackingthreat actorhazyhawkinfoblox
https://opensourcemalware.com/blog/polinrider-attack
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos | OpenSourceMalware
A North Korean threat actor is implanting malware in hundreds of GitHub users and organizations repositories. This malware is the latest DPRK Beavertail...
threat actorgithub reposdprkimplantsmalware
Sponsored https://darlink.ai/
DarLink AI: Free AI Girlfriend Generator | Chat, Photos & Video
Create your ideal AI Girlfriend with DarLink AI. Customize her look and personality, chat naturally, and enjoy personalized photos, videos, and voice for a...
https://feedly.com/threat-intelligence/use-cases/threat-actor-behavior
Monitor threat actor behavior (TTPs) | Feedly Threat Intelligence
Feedly AI discovers and extracts TTPs from the open web
threat actormonitorbehaviorfeedlyintelligence
https://www.proofpoint.com/us/threat-reference/threat-actor
What Is a Cyber Threat Actor? Definition, Types, Examples | Proofpoint US
Discover what a cyber threat actor is and how they launch attacks. Explore key types, real-world examples, and expert insights. Learn more with Proofpoint.
what iscyber threatactordefinitiontypes
https://edscoop.com/threat-actor-hijacked-subdomains-at-30-major-universities-researcher-found/
Threat actor hijacked subdomains at 30+ major universities, researcher found | EdScoop
Apr 20, 2026 - Subdomain hijackings are a common technique for piggybacking on the prestige of respected institutions, a researcher wrote.
threat actorsubdomainsmajoruniversitiesresearcher
https://malpedia.caad.fkie.fraunhofer.de/actor/void_manticore
Void Manticore (Threat Actor)
Void Manticore is an Iranian APT group affiliated with MOIS, known for conducting destructive wiping attacks and influence operations. They collaborate with...
threat actorvoidmanticore
https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art
Magecart threat actor rolls out convincing modal forms
To ensnare new victims, criminals will often devise schemes that attempt to look as realistic as possible. Having said that, it is not...
threat actorrollsconvincingmodalforms
https://www.malwarebytes.com/glossary/threat-actor
Threat actor | Malwarebytes Glossary
In cybersecurity, a threat actor is a group or person behind a malicious incident. As it is sometimes unclear whether an...
threat actormalwarebytesglossary
https://feedly.com/ti-essentials/posts/a-guide-to-threat-actor-profiling-a-deliverable-first-approach
Threat Actor Profiling: A 6-Step Framework for CTI Teams | TI Essentials | Feedly
threat actorti essentialsprofilingstepframework
https://www.ibm.com/think/topics/threat-actor
What is a Threat Actor? | IBM
Nov 17, 2025 - Threat actors are individuals or groups that attack digital devices, networks or computer systems.
what isthreat actoribm
https://feedly.com/ti-essentials/posts/validating-new-adversary-tactics-introducing-the-tactical-decomposition-workflow
How to Validate if a Threat Actor's Tactics are Really "New" | TI Essentials | Feedly
how tothreat actorti essentialsvalidatetactics