Category: ThreatIntelligence-IncidentResponse

09
Mar
2026

Mutagen Astronomy: A Linux Vulnerability’s Path to CISA KEV

Introduction On January 26, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2018-14634 to its Known Exploited Vulnerabilities (KEV)…

Huntress Catches SmarterMail Account Takeover Leading to RCE
09
Mar
2026

Huntress Catches SmarterMail Account Takeover Leading to RCE

Background / Summary  The Huntress DE&TH (Detection Engineering and Threat Hunting) Team has observed in-the-wild exploitation of a privileged account…

How Huntress Managed ITDR's New Incident Report Timeline Changes Response
09
Mar
2026

How Huntress Managed ITDR’s New Incident Report Timeline Changes Response

Data exfiltration has quietly become one of the fastest-moving—and most damaging—outcomes of modern cyberattacks. Today’s attackers aren’t breaking in and…

Navigating Through The Fog - The DFIR Report
09
Mar
2026

Navigating Through The Fog – The DFIR Report

Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in…

The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs
09
Mar
2026

The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs

The story so far In Part 1, we learned that Impacket’s LDAP reconnaissance tools use OID-based filters that get transformed…

Screenshot of Moltbook front page, A Social Network for AI Agents
09
Mar
2026

I pretended to be an AI agent on Moltbook so you don’t have to

I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found…

Why strong auth could fail at SaaS session integrity
09
Mar
2026

Why strong auth could fail at SaaS session integrity

As security professionals, we have spent the better part of a decade building the ultimate digital fortress. We deployed FIDO2,…

A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in February 2026.
08
Mar
2026

February 2026 Microsoft Patch Tuesday

2Critical 51Important 1Moderate 0Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that…

Tenable Cloud Risk Report 2026 chart showing orgs with overprivileged IAM roles in AWS
08
Mar
2026

2026 Cloud security and AI security risk report

AI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities…

Threat hunting process
08
Mar
2026

Hunting for malicious OpenClaw AI in the modern enterprise

When shadow IT is discussed, it’s usually in the context of unauthorized SaaS apps or stray cloud buckets. But there’s…

08
Mar
2026

Microsoft and Adobe Patch Tuesday, February 2026 Security Update Review

Microsoft’s February 2026 Patch Tuesday focuses on closing security gaps that attackers could exploit, reinforcing the importance of timely patching in enterprise environments. Here’s a quick breakdown of what you need to know. Microsoft…

08
Mar
2026

Qualys Recognized as a Leader in the 2026 Forrester Wave for CNAPP

Qualys’ Key Takeaways Qualys Named a Leader: Recognized as one of only three leaders in The Forrester Wave: Cloud-Native Application…