<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Elemendar]]></title><description><![CDATA[Elemendar]]></description><link>https://www.elemendar.ai/blog</link><generator>RSS for Node</generator><lastBuildDate>Mon, 04 May 2026 12:49:35 GMT</lastBuildDate><atom:link href="https://www.elemendar.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Threat Intelligence Update                                      27 Dec - 05 Jan  2025            TLP: CLEAR ]]></title><description><![CDATA[Stay updated on the latest cybersecurity developments in our December 2024 Cyber Threat Intelligence report. ]]></description><link>https://www.elemendar.ai/post/threat-intelligence-update-27-dec-05-jan-2025</link><guid isPermaLink="false">67793856ae443e9cce88aa16</guid><category><![CDATA[CTI Reports]]></category><pubDate>Sat, 04 Jan 2025 14:54:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_9d37808b72d944df8b0e1e8b70740442~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Cybersecurity Threat Landscape in 2025              TLP: CLEAR]]></title><description><![CDATA[**Meta Description:**  
Explore the evolving cyber threat landscape in 2025, shaped by geopolitical tensions, AI advancements, and expanding]]></description><link>https://www.elemendar.ai/post/cybersecurity-threat-landscape-in-2025</link><guid isPermaLink="false">67658d7f414039a202cb9849</guid><category><![CDATA[CTI Reports]]></category><pubDate>Fri, 20 Dec 2024 15:48:14 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_a616304ac0704409a6ff1a098f28d8eb~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Threat Intelligence Update                                      06 Dec - 11 Dec  2024            TLP: CLEAR ]]></title><description><![CDATA[This report was processed and collated by the Elemendar CTI team and includes Mitre ATT&#38;CK TTPS and IOCs collated from using one of our...]]></description><link>https://www.elemendar.ai/post/threat-intelligence-update-06-dec-11-dec-2024</link><guid isPermaLink="false">675c9b9a3bef5114d5904dff</guid><category><![CDATA[CTI Reports]]></category><pubDate>Fri, 13 Dec 2024 22:33:57 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_b4f8bdeb04284a8d8c4880d3d3194d59~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Threat Intelligence Update                                      29 Nov - 5 Dec  2024            TLP: CLEAR   ]]></title><description><![CDATA[Critical Cyber Threats: Ransomware, NCSC Warnings, and Black Basta Exploits]]></description><link>https://www.elemendar.ai/post/threat-intelligence-update-29-nov-5-dec-2024</link><guid isPermaLink="false">6756d339719f86fd1c103425</guid><category><![CDATA[CTI Reports]]></category><pubDate>Mon, 09 Dec 2024 12:38:24 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_2cf74e038bf047b4a025455a1cfe6078~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Threat Intelligence Update                                      22 - 28 November 2024         TLP: CLEAR  ]]></title><description><![CDATA[Stay ahead of cyber threats with Elemendar's Threat Intelligence Update. APT28 hacks, Ghost Tap exploits, &#38; UK hospital attacks—watch now!]]></description><link>https://www.elemendar.ai/post/threat-intelligence-update-22-28-november-2024</link><guid isPermaLink="false">674a1318d536db5bba7c8a4c</guid><category><![CDATA[CTI Reports]]></category><pubDate>Fri, 29 Nov 2024 20:09:41 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_66d70d3e2a1444a5b7242d331ee8c0f5~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Threat Intelligence Update                                      15 - 21 November 2024         TLP: CLEAR  ]]></title><description><![CDATA[Discover the latest cyber threats in our weekly update, including Salt Typhoon's cyberespionage targeting telecoms and Helldown ransomware]]></description><link>https://www.elemendar.ai/post/threat-intelligence-update-15-21-november-2024-tlp-c</link><guid isPermaLink="false">674393c4b98777e204449d3a</guid><category><![CDATA[CTI Reports]]></category><pubDate>Sun, 24 Nov 2024 22:15:09 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_63257b0e0b464da4a8f15b4958b53bf3~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[CTI Threat Summary                                     08 - 14 November 2024       TLP: CLEAR  ]]></title><description><![CDATA[Discover the top three cyber threats this week: Frag ransomware exploiting Veeam systems, advanced phishing]]></description><link>https://www.elemendar.ai/post/cti-threat-summary-08-14-november-2024-tlp-clear</link><guid isPermaLink="false">673a48031c8bd1f5d8469f6b</guid><category><![CDATA[CTI Reports]]></category><pubDate>Sun, 17 Nov 2024 20:45:19 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_152d215636d44ab785a92dab8fe67140~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Cyber Threat Intelligence Summary                                     01 - 07 November 2024       TLP: CLEAR  ]]></title><description><![CDATA[Explore Microsoft's findings on credential theft by Chinese-linked botnet CovertNetwork-1658, leveraging SOHO routers for stealth attacks. ]]></description><link>https://www.elemendar.ai/post/cyber-threat-intelligence-summary-01-07-november-2024-tl</link><guid isPermaLink="false">6730d4f5abde9672e8fda932</guid><category><![CDATA[CTI Reports]]></category><pubDate>Sun, 10 Nov 2024 19:12:50 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_a16caf657af64b52a8d374c25093f4b3~mv2.gif/v1/fit/w_1000,h_720,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Cyber Threat Intelligence Summary                                   25 - 31 October 2024            TLP: CLEAR  ]]></title><description><![CDATA[This report was processed and collated by the Elemendar CTI team and includes Mitre ATT&#38;CK TTPS and IOCs collated from using one of our...]]></description><link>https://www.elemendar.ai/post/cyber-threat-intelligence-summary-25-31-october-2024</link><guid isPermaLink="false">6727f3789bb21c3d15fc8975</guid><category><![CDATA[CTI Reports]]></category><pubDate>Sun, 03 Nov 2024 23:27:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_49695951078342cab01389d392cee5b2~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Cyber Threat Intelligence Summary                                    18 - 24 October 2024            TLP: CLEAR ]]></title><description><![CDATA[This report was processed and collated by the Elemendar CTI team and includes Mitre ATT&#38;CK TTPS and IOCs collated from using one of our...]]></description><link>https://www.elemendar.ai/post/cyber-threat-intelligence-summary-october</link><guid isPermaLink="false">671a97bbe88a64a51822b963</guid><category><![CDATA[CTI Reports]]></category><pubDate>Fri, 25 Oct 2024 10:56:06 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/cd1420_8c8e1370a039469c95dd41b15c892093~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Taking AIM at Data Fusion - Using the Ontological Approach - technical details.]]></title><description><![CDATA[Previous blogs in this ‘Taking AIM at Data Fusion’ series provide an understanding of how Advanced Information Modelling (AIM) applies...]]></description><link>https://www.elemendar.ai/post/taking-aim-at-data-fusion-using-the-ontological-approach-technical-details</link><guid isPermaLink="false">670d482963214eea7567064b</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Tue, 15 Oct 2024 08:46:16 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Taking AIM at Data Fusion - Part 2 - Data fusion for Cyber Threat Intelligence.]]></title><description><![CDATA[In part 1 of this blog , we introduced the concept of data fusion and how Advanced Information Modelling (AIM) can help. If you haven’t...]]></description><link>https://www.elemendar.ai/post/taking-aim-at-data-fusion-part-2-data-fusion-for-cyber-threat-intelligence</link><guid isPermaLink="false">66ec0f907d383cbbadfd8025</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Thu, 19 Sep 2024 12:55:52 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Taking AIM at Data fusion (part 1) Why Advanced Information Modelling (AIM) matters to the businesses of today (and tomorrow)]]></title><description><![CDATA[If you haven’t heard of it, the challenge of ‘data fusion’ is an increasing issue for how businesses manage and process their data ]]></description><link>https://www.elemendar.ai/post/taking-aim-at-data-fusion-part-1-why-advanced-information-modelling-aim-matters-to-the-businesse</link><guid isPermaLink="false">66e07f6c76dca48ebb2e37e5</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Tue, 10 Sep 2024 17:50:32 GMT</pubDate><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[A Perspective from a CTI Analyst: ISO 27001 (vs. 27002)]]></title><description><![CDATA[This blog post was authored by: Ragini Gurumurthy, Junior CTI Analyst. Roy Liebermann, Head Of Customer Success There is no doubt that in...]]></description><link>https://www.elemendar.ai/post/a-perspective-from-a-cti-analyst-iso-27001-vs-27002</link><guid isPermaLink="false">66b1e808ce10dd761f84ce0d</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Tue, 06 Aug 2024 10:45:19 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Building Consistency In Cybersecurity Investigations]]></title><description><![CDATA[Building consistency in cybersecurity investigations.]]></description><link>https://www.elemendar.ai/post/building-consistency-in-cybersecurity-investigations</link><guid isPermaLink="false">66a8a2cbe5ebc9778cd54add</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Tue, 30 Jul 2024 10:52:00 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Elemendar and Maltego Partner to Revolutionize Cyber Threat Intelligence.]]></title><description><![CDATA[Elemendar is thrilled to announce our strategic partnership with Maltego, the world’s most used cyber investigation platform. ]]></description><link>https://www.elemendar.ai/post/elemendar-and-maltego-partner-to-revolutionize-cyber-threat-intelligence</link><guid isPermaLink="false">669f95895f405efb5c16b2c0</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Tue, 23 Jul 2024 11:48:29 GMT</pubDate><dc:creator>Elemendar</dc:creator></item><item><title><![CDATA[Elevating Cybersecurity: Elemendar's Partnership with IBM]]></title><description><![CDATA[At Elemendar, we are committed to delivering cutting-edge cybersecurity solutions that help organizations stay ahead of ever-evolving...]]></description><link>https://www.elemendar.ai/post/elevating-cybersecurity-elemendar-s-partnership-with-ibm</link><guid isPermaLink="false">666b0c0be20c83d17a8b550a</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Thu, 13 Jun 2024 15:13:07 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[Cyber Security And Cyber Risk: A Delicate Relationship]]></title><description><![CDATA[In the cyberspace realm, security is a relatively new concept; risk management has been ingrained in business for much longer than...]]></description><link>https://www.elemendar.ai/post/cyber-security-and-cyber-risk-a-delicate-relationship</link><guid isPermaLink="false">6662cd043e93d5bef1eee07b</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Thu, 18 Apr 2024 14:30:17 GMT</pubDate><dc:creator>Elemendar </dc:creator></item><item><title><![CDATA[100% Synthetic – A New Disinformation Vector?]]></title><description><![CDATA[The rise of artificial intelligence (AI) has led to a new form of content slowing growing predominantly on video sharing sites such as...]]></description><link>https://www.elemendar.ai/post/100-synthetic-a-new-disinformation-vector</link><guid isPermaLink="false">6662cd028a5e161ecd2a9b38</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Mon, 25 Mar 2024 12:32:56 GMT</pubDate><dc:creator>Stewart Bertram</dc:creator></item><item><title><![CDATA[Threat Intelligence: Friend or Foe in Cyber-Risk Management?]]></title><description><![CDATA[Cyber Threat Intelligence (CTI) is often criticised as behaving more like data than intelligence. When applied to cyber-risk management,...]]></description><link>https://www.elemendar.ai/post/threat-intelligence-friend-or-foe-in-cyber-risk-management</link><guid isPermaLink="false">6662ccfff8739e06e21e9fa8</guid><category><![CDATA[Elemendar Blog]]></category><pubDate>Wed, 13 Mar 2024 16:44:52 GMT</pubDate><dc:creator>Ragini Gurumurthy</dc:creator></item></channel></rss>