The constant stream of cybersecurity headlines presents a dual challenge for security teams: identifying which threats are...
Threat Hunting
When Huntress analysts investigated a Qilin ransomware attack with limited post-infection visibility, they demonstrated how meticulous forensic...
Microsoft has announced a significant shift in its security strategy by integrating the System Monitor (Sysmon) tool...
In a significant enforcement action, the U.S. Department of Justice announced that five individuals have pleaded guilty...
Artificial Intelligence is fundamentally reshaping the cybersecurity domain, serving as both a powerful weapon for attackers and...
In a significant blow to transnational cybercrime, a five-month international operation led by Interpol has resulted in...
A coordinated wave of swatting attacks has disrupted college campuses across the United States at the start...
Amazon’s threat intelligence team has successfully identified and disrupted a sophisticated watering hole campaign in June 2025,...
The Pakistan-linked threat actor APT36 (also known as Transparent Tribe or Mythic Leopard) has significantly evolved its...
Mustafa Suleyman, CEO of Microsoft AI, has publicly expressed significant concern regarding a new class of psychological...
The current state of email security is analogous to the endpoint protection landscape a decade ago, relying...
On August 19, 2025, Okta announced the open-source release of a catalog of pre-built Sigma detection rules...
In an era where cyber threats evolve rapidly, proactive threat hunting has become a necessity for organizations...
Black Hat Asia 2025 showcased cutting-edge security operations center (SOC) technologies and threat-hunting methodologies, with Cisco returning...
The National Crime Agency (NCA) has issued a stark warning about organized online groups grooming girls as...
The National Crime Agency (NCA) has released a report detailing the alarming rise of online gangs exploiting...
The Black Hat Asia 2025 conference, held at Marina Bay Sands in Singapore from April 1–4, showcased...
The National Crime Agency (NCA) has identified a disturbing trend of online grooming gangs targeting girls as...
Cybercriminals are increasingly using sophisticated Traffic Distribution Systems (TDS) like TAG-124 to deliver ransomware and malware to...
A newly uncovered phishing-as-a-service (PhaaS) platform, named “Morphing Meerkat,” has been leveraging DNS mail exchange (MX) records...