{
	"id": "9f416f8d-14e9-4004-8cad-56ced4e1b3d2",
	"created_at": "2026-04-06T00:17:32.932714Z",
	"updated_at": "2026-04-10T03:21:40.097362Z",
	"deleted_at": null,
	"sha1_hash": "f3bed31f981ec23ffd2470ab6afe0617ccda5926",
	"title": "Cyber threat intelligence",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28303,
	"plain_text": "Cyber threat intelligence\r\nBy PricewaterhouseCoopers\r\nPublished: 2025-12-03 · Archived: 2026-04-05 18:45:52 UTC\r\nGet timely, tactical, and strategic data on the global threat landscape. So you can make more informed, risk-based\r\ndecisions.\r\nThreat intelligence reporting\r\nStay ahead of the game with technical reports on new targeted attack campaigns, as well as strategic reporting on a\r\nparticular region, sector, or actor of interest to your organisation.\r\nThreat intelligence data\r\nMonitor ongoing threats with a high-confidence feed of single value indicators associated with targeted attacks.\r\nAccess network IDS and file detection signatures. Contextualise relationships between indicators and threat\r\nactors. Formats supported include network detection (via Suricata or Snort) and end point detection content (via\r\nSIGMA or Yara).\r\nThreat intelligence portal\r\nUse this site as a resource to access the most relevant threat research to your organisation, including our reporting,\r\ntechnical data, and threat actor information. Query threat data, including indicators of compromise, and tailor\r\nfeeds to your areas of interest.\r\nThreat context\r\nAccess a private collaboration space, with direct access to our analysts, providing broader context around the\r\nthreats you’re investigating. People and technology work hand in hand to deliver faster, more intelligent and better\r\noutcomes.\r\nContact us for more information\r\nSource: https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html\r\nhttps://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html"
	],
	"report_names": [
		"old-cat-new-tricks.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434652,
	"ts_updated_at": 1775791300,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f3bed31f981ec23ffd2470ab6afe0617ccda5926.pdf",
		"text": "https://archive.orkl.eu/f3bed31f981ec23ffd2470ab6afe0617ccda5926.txt",
		"img": "https://archive.orkl.eu/f3bed31f981ec23ffd2470ab6afe0617ccda5926.jpg"
	}
}