Video Poster Image

Cyber Threat Intelligence from BlackBerry

The BlackBerry Threat Research and Intelligence team works 24x7x365 to hold the line against threat actors and cyberattacks, identifying and stopping threats no one has ever seen before.

Subscribe to get our latest threat research and intelligence and stay up to date on recent attacks.

BlackBerry Global Threat Intelligence Report — November 2023 Edition

BlackBerry Global Threat Intelligence Report — November 2023 Edition

Learn about the recent threats seen firsthand by the BlackBerry Threat Research and Intelligence team. This edition highlights the 70 percent increase in unique malware, most common types of attacks, and explosion of multi-level ransomware attacks.

Read the report and watch our webinar and discussion.

Recent BlackBerry Threat Research and Intelligence Alerts

Aftermath of the Qakbot Takedown: Is My Organization Safe?

The DOJ and FBI’s joint takedown of Qakbot was a multinational operation that culminated in the disruption of one of the world’s longest-running malware families and botnets. 700,000 computers were impacted globally, including 200,000 in the U.S. Since no arrests were made, new and worrying activity suggests the law enforcement operation may not have impacted Qakbot operators' spam delivery infrastructure, but rather only their command-and-control (C2) servers.

How to Reduce the Risk of LockBit Ransomware as Victim List Grows

Canadian officials charged one of LockBit’s alleged operators with new cybercrimes as he awaits extradition to the United States. The threat actor added one of the world’s largest international law firms to the list of household names it has breached. This follows last month’s successful attack against one of the planet’s top manufacturers of commercial jetliners and defense, space, and security systems—potentially affecting customers in more than 150 countries.

Sneaky Technique Can Steal Sensitive Info from Your Graphics Card

Researchers from four top American universities uncovered a new way for threat actors to access visual information, such as usernames and passwords, from your graphics card while you're online and browsing certain websites. Researchers call this threat “” because it takes advantage of the hidden data compression methods used by modern graphics processing units (GPUs) to leak visual data to a malicious third party.

Live and On-Demand Webinars

Global Threat Intelligence Report Deep Dive — November 2023 Edition

Watch this webinar for a deep dive into the November edition of the BlackBerry Global Threat Intelligence Report, which highlights the increase in unique malware, industry-specific attacks, most common types of attacks and explosion of multi-level ransomware attacks. Use these comprehensive insights from top researchers and analysts to increase your cyber resilience with actionable intelligence.

BlackBerry LIVE: Dark Knight 2.0 - Guide for CTI Reporting

Successful adversary emulation is a direct result of excellent cyber threat intelligence (CTI), which relies heavily upon proper CTI reporting that is informed by intelligence analysts, red team operators, and blue team defenders. Join the BlackBerry and MITRE ATT&CK Evaluations teams for a conversation on what makes CTI reporting useful and how it enables effective purple teaming.
What Is CylanceINTELLIGENCE and How Can It Help?

What Is CylanceINTELLIGENCE and How Can It Help?

Empower your security teams with CylanceINTELLIGENCE™, a subscription CTI service that helps organizations avoid breaches by delivering contextual threat intelligence designed for preventing, hunting, and responding to dynamic attacks.

Meet the Global Team Representatives

Ismael Valenzuela

Vice President, Threat Research and Intelligence

Cesar Vargas

Director, Applied Researcher

Anuj Soni

Principal Threat Researcher

Eoin Healy

Senior Threat Researcher

Dean Given

Senior Threat Researcher

Dmitry Melikov

Threat Researcher

Alexandra Mozil

Senior Threat Researcher

Pedro Drimel

Threat Researcher, Consultant

Geoff O’Rourke

Technical Lead

Jacob Faires

Senior Threat Researcher

Masaki Kasuya

Principal Threat Researcher

Natasha Rohner

Principal Threat Research Publisher