The State of the Dark Web
If you’re a regular visitor to our blog, you may remember a most fascinating voyage last year. We took a plunge to the darkest corner…
If you’re a regular visitor to our blog, you may remember a most fascinating voyage last year. We took a plunge to the darkest corner…
Background Huntress analysts observe and block a wide variety of attacks on a weekly basis. Some of these attacks may be initial forays into the…
Setting Sail with SIEM If you’ve ever been on a cruise, you might recall looking at the ship’s list of daily activities and becoming overwhelmed.…
It’s another busy day at work, and you finally find 20 minutes to catch up on emails (and maybe grab some lunch, if you’re lucky).…
Somehow, it’s already October. Fall is officially upon us, pumpkin spice is back with a vengeance, and we all get to celebrate another Cybersecurity Awareness…
On January 19, 2024 Microsoft released a statement regarding the threat actor group named “Midnight Blizzard”—this state-sponsored actor was observed by Microsoft as performing password…
Trigger events are the leading cause for implementing a security awareness training program. After all, most organizations don’t just volunteer to spend money until they…
We sat down with Brian Harrell, VP of Security at AlertEnterprise, and talked about the NERC CIP-014 Standard. If you aren’t familiar with CIP-014 or…
As we get closer to the CIP Version 5 effective date, we still get asked questions about what NERC CIP training requirements are needed in…
A quarterly look at Elastic’s security integrations ecosystem Security teams can only protect what they can see. Gaps in coverage, like a macOS fleet generating…
Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management strategy. Learn…
Cybersecurity is always full of surprises, and 2024 has been no exception. We’re only in October, and we’ve seen some severe curveballs come our way.…