Threat Landscape

Explore the threat landscape shaping the cloud. These articles examine attacker behavior, cloud-native techniques, and how teams use intel to strengthen security decisions.

What is OSINT (open-source intelligence)?

Equipo de expertos de Wiz

Open source intelligence (OSINT) is the process of collecting, analyzing, and converting publicly available information about an organization's digital footprint into clear technical insights that guide security decisions.

Top threat intelligence platforms in 2026

Threat intelligence platforms (TIPs) aggregate attacker data from OSINT, dark web sources, commercial feeds, and adversary infrastructure to highlight the threats most likely to be exploited.

Ver demostración de 12 minutos

Mira cómo Wiz convierte la visibilidad instantánea en una remediación rápida.

Para obtener información sobre cómo Wiz maneja sus datos personales, consulte nuestra Política de privacidad.

Wiz starWiz starWiz starWiz star

Threat Intelligence: Types, Lifecycle, and Use Cases

Equipo de expertos de Wiz

Threat intelligence is the systematic collection and analysis of data about current and emerging cyber threats that helps organizations make informed security decisions.

Top 9 OSINT tools

Equipo de expertos de Wiz

Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.

What is APT38?

Equipo de expertos de Wiz

APT38 is a North Korean state-sponsored threat group that conducts financially motivated cyberattacks against banks, cryptocurrency exchanges, and financial institutions worldwide.

What is APT29?

Equipo de expertos de Wiz

APT29 is a Russian state-sponsored advanced persistent threat (APT) group attributed to Russia's Foreign Intelligence Service (SVR), conducting cyber espionage operations since at least 2008.

What is APT42? Threat Actor Profile

Equipo de expertos de Wiz

APT42 is an Iranian state-sponsored cyber espionage group that uses tailored spear phishing and cloud account access for long-term surveillance.

What is APT33?

Equipo de expertos de Wiz

APT33 is believe to be a state-sponsored threat actor active since 2013, conducting long-term intelligence operations against aerospace, energy, and defense organizations to steal intellectual property that advances Iran's military and economic capabilities.

What is business email compromise (BEC)?

Equipo de expertos de Wiz

Business email compromise is a targeted cyberattack where criminals impersonate someone you trust—like your CEO, a vendor, or a business partner—to trick you into sending money or revealing confidential information.

What are backdoor attacks in cloud environments?

Equipo de expertos de Wiz

A backdoor attack creates a hidden method for bypassing standard authentication or security controls in a computer system, application, or network. Think of it as a secret entrance that allows attackers to return to a compromised system whenever they want, without going through the front door.

What is an advanced persistent threat (APT)?

Equipo de expertos de Wiz

An advanced persistent threat is a sophisticated cyberattack where skilled hackers break into your network and stay hidden for months or even years

What are indicators of attack (IOAs) in cloud security?

Equipo de expertos de Wiz

Indicators of attack (IOAs) are real-time behavioral signals that reveal active malicious activity in your cloud environment. Unlike static signatures, IOAs detect attacker techniques as they happen.

IOA vs IOC: Key differences explained

Equipo de expertos de Wiz

Indicators of compromise are forensic artifacts that prove a security breach has already happened. Think of IOCs as digital fingerprints left behind at a crime scene—they're specific pieces of evidence that confirm an attacker was in your system.

What is enrichment in threat intelligence?

Equipo de expertos de Wiz

Enrichment in threat intelligence is the process of adding context, metadata, and relationships to raw security data to make it actionable.

Dark web vs deep web: Understanding the differences

Equipo de expertos de Wiz

While the deep web is mostly used for legitimate, private activities, the dark web hosts both illegal marketplaces and serves as a haven for privacy-seekers and activists in repressive regimes.

What is the threat intelligence lifecycle?

Equipo de expertos de Wiz

The threat intelligence lifecycle is a continuous, six-phase process that transforms raw data about potential cyber threats into refined, actionable intelligence

What Is a Brute Force Attack? Types and Countermeasures

Equipo de expertos de Wiz

A brute force attack is a cybersecurity threat where a hacker attempts to access a system by systematically testing different passwords until a correct set of credentials is identified.