fastfire
banner
fastfire.bsky.social
fastfire
@fastfire.bsky.social
480 followers 110 following 16 posts
Threat Intelligence Team Leader @ Würth Group, CPENT/CEH/CND/CSA/ECSA, owner of SATAYO CTI platform & deepdarkCTI project - member of @Curatedintel
Posts Media Videos Starter Packs
@ichinin.bsky.social I don't think you read the article carefully; perhaps you just looked at the image. The indicators provided are always contextualized within an analysis ticket. So, yes, it's intelligence.
🔴The problem of properly integrating #Threat #Intelligence into #Security #Operations processes is a recurring one.
📌 I wrote an article in which I described the integration process we have implemented.
👉🏻 Read the article here www.neteye-blog.com/2025/11/embe...
Reposted by fastfire
#Ransomware 📣 NEW FEATURE
La nuova sezione RF Domain Monitor permette il monitoraggio costante dei domini sotto controllo #Ransomfeed e di deepdarkCTI project (@fastfire.bsky.social), alla ricerca di variazioni DNS e law enforcement.
1/2
📢 We interviewed Gabi, a member of the #Cyber ​​#Toufan group. This group, active since October 2024, has carried out several attacks against #Israeli targets.
The full interview is available at the link deepdarkcti.com/interview-7-...
📢 At deepdarkcti.com/details-of-t..., you can find a detailed timeline of the main events related to the alleged seizure of the #XSS forum.
⏰ The timeline is constantly updated, taking into account relevant events that are also occurring in recent days.
#deepdarkCTI
📢 A new interview is available on the #deepdarkCTI website. This time, community member #Erez interviewed the founder of the #Devman ransomware gang.
👉🏻 You can read the full interview at this link deepdarkcti.com/interview-6-...
📢 New Critical Vulnerabilities Disclosed for Citrix Netscaler support.citrix.com/support-home...
Loading...
support.citrix.com
We interviewed #Se7en, the founder of #Exodus #Market, a platform for selling #infostealers #logs.
Read the full interview here deepdarkcti.com/interview-5-...
New ransomware gang #RunSomeWares DLS. 4 victims claimed. Already indexed on #deepdarkCTI
New ransomware gang #Anubis DLS. Already indexed on #deepdarkCTI
⚔️ New data leak site: #Kraken ransomware gang. The gang seems to be simply a rebrand of #HelloKitty, as of the 5 victim organizations already declared, 2 (Cisco and CDProject) had already been previously declared.
🎯 The DLS link has already been added to #deepdarkCTI (github.com/fastfire/dee...).
Some updates regarding the #Gravy #Analytics data breach. I analyzed part of the data shared by TA #nightly on #XSS forum. Some of the numbers involved:
13473 applications
396115 ip
3317 organizations
43586 locations
11 countries
330543 partners email accounts
Happy Holidays to the amazing #deepdarkCTI community! Our project has reached 4600 stars this year, since the beginning of the project we have had 93 contributors, in the private Telegram channel there are about 100 users, we have counted over 1900 sources! Thank you all so much!
When you work together with friends, everything is easier! #CyberSec #ThreatIntelligence
Great list @oxley.io! If you would consider adding my account... thanks!