Research &
Reports
Selected research published by Idenfy analysts. Threat actor profiles, exposure case studies, and sector-specific intelligence briefings: written for practitioners and decision-makers alike.
How Proactive Intelligence Stopped a Targeted Campaign Before It Reached Production
A European technology company approached Idenfy following unusual mentions in a closed underground forum. Over six weeks, our analysts tracked a financially-motivated threat actor constructing a targeted phishing infrastructure against their executive team, and identified the attack 11 days before initial deployment.
Anatomy of a Ransomware Operation: Infrastructure, Recruitment, and Target Selection
An in-depth technical and operational profile of a ransomware-as-a-service group: from affiliate recruitment on underground forums to ransom negotiation TTPs and cryptocurrency laundering patterns.
The Credential Ecosystem: How Stolen Data Moves From Breach to Attack
A follow-the-data analysis of the lifecycle of a stolen credential: from initial breach, through aggregation markets, to eventual use in account takeover or lateral movement campaigns. Particular focus on the financial services sector.
State-Sponsored Cyber Activity and the Targeting of European Critical Infrastructure
An assessment of nation-state cyber operations directed at European energy, transport, and telecommunications infrastructure: including actor attribution, observed TTPs, and strategic intent analysis.
Building the Picture: OSINT-Driven Entity Resolution in Adversary Attribution
A practitioner's note on the analytical techniques Idenfy uses to resolve pseudonymous threat actors into confirmed identities: covering source selection, cross-referencing, confidence calibration, and legal considerations.
Monthly
Briefings
Receive a curated monthly threat intelligence briefing tailored to your sector and risk profile. Written by Idenfy analysts. No marketing, no vendor content: only intelligence.