[ Request Briefing ]
// FIELD INTELLIGENCE

Research &
Reports

Selected research published by Idenfy analysts. Threat actor profiles, exposure case studies, and sector-specific intelligence briefings: written for practitioners and decision-makers alike.

CASE STUDY: FEATURED

How Proactive Intelligence Stopped a Targeted Campaign Before It Reached Production

A European technology company approached Idenfy following unusual mentions in a closed underground forum. Over six weeks, our analysts tracked a financially-motivated threat actor constructing a targeted phishing infrastructure against their executive team, and identified the attack 11 days before initial deployment.

Request Full Report →
THREAT ACTOR PROFILE
Ransomware Eastern Europe Double Extortion

Anatomy of a Ransomware Operation: Infrastructure, Recruitment, and Target Selection

An in-depth technical and operational profile of a ransomware-as-a-service group: from affiliate recruitment on underground forums to ransom negotiation TTPs and cryptocurrency laundering patterns.

Request Report →
SECTOR REPORT
Credential Theft Initial Access Finance

The Credential Ecosystem: How Stolen Data Moves From Breach to Attack

A follow-the-data analysis of the lifecycle of a stolen credential: from initial breach, through aggregation markets, to eventual use in account takeover or lateral movement campaigns. Particular focus on the financial services sector.

Request Report →
GEOPOLITICAL INTELLIGENCE
Nation-State APT Critical Infrastructure

State-Sponsored Cyber Activity and the Targeting of European Critical Infrastructure

An assessment of nation-state cyber operations directed at European energy, transport, and telecommunications infrastructure: including actor attribution, observed TTPs, and strategic intent analysis.

Request Report →
METHODOLOGY NOTE
OSINT Investigation Attribution

Building the Picture: OSINT-Driven Entity Resolution in Adversary Attribution

A practitioner's note on the analytical techniques Idenfy uses to resolve pseudonymous threat actors into confirmed identities: covering source selection, cross-referencing, confidence calibration, and legal considerations.

Request Report →

Monthly
Briefings

Receive a curated monthly threat intelligence briefing tailored to your sector and risk profile. Written by Idenfy analysts. No marketing, no vendor content: only intelligence.

Need intelligence
on a specific threat?

Commission a Report →