Category: ThreatIntelligence-IncidentResponse
Stop me if you’ve heard this one before: security alerts can be noisy. Mostly, these noisy alerts are communicating information…
{ “TenantId”: “52672484-b4e1-402d-934c-a8e2fd9b05d1”, “SourceSystem”: “Azure AD”, “TimeGenerated”: “2025-12-02T20:22:16.1185371Z”, “ResourceId”: “/tenants/747930ee-9a33-43c0-9d5d-470b3fb855e7/providers/Microsoft.aadiam”, “OperationName”: “Add service principal”, “OperationVersion”: “1.0”, “Category”: “ApplicationManagement”, “ResultType”: “”,…
One of the first steps in basic IT and security hygiene is maintaining an accurate inventory of all assets, including…
Introduction On January 26, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2018-14634 to its Known Exploited Vulnerabilities (KEV)…
Background / Summary The Huntress DE&TH (Detection Engineering and Threat Hunting) Team has observed in-the-wild exploitation of a privileged account…
Data exfiltration has quietly become one of the fastest-moving—and most damaging—outcomes of modern cyberattacks. Today’s attackers aren’t breaking in and…
Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in…
The story so far In Part 1, we learned that Impacket’s LDAP reconnaissance tools use OID-based filters that get transformed…
I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found…
As security professionals, we have spent the better part of a decade building the ultimate digital fortress. We deployed FIDO2,…
2Critical 51Important 1Moderate 0Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that…
AI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities…











