Category: ThreatIntelligence-IncidentResponse

Screenshot of plain language instructions to an AI agent in the Red Canary Portal
09
Mar
2026

The key of AI: How Agentic Tuning can make your detection strategy sing

Stop me if you’ve heard this one before: security alerts can be noisy. Mostly, these noisy alerts are communicating information…

copy icon
09
Mar
2026

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

{ “TenantId”: “52672484-b4e1-402d-934c-a8e2fd9b05d1”, “SourceSystem”: “Azure AD”, “TimeGenerated”: “2025-12-02T20:22:16.1185371Z”, “ResourceId”: “/tenants/747930ee-9a33-43c0-9d5d-470b3fb855e7/providers/Microsoft.aadiam”, “OperationName”: “Add service principal”, “OperationVersion”: “1.0”, “Category”: “ApplicationManagement”, “ResultType”: “”,…

How Hacked Construction Apps Are Bringing Down Jobsite Security
09
Mar
2026

How Hacked Construction Apps Are Bringing Down Jobsite Security

One of the first steps in basic IT and security hygiene is maintaining an accurate inventory of all assets, including…

09
Mar
2026

Mutagen Astronomy: A Linux Vulnerability’s Path to CISA KEV

Introduction On January 26, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2018-14634 to its Known Exploited Vulnerabilities (KEV)…

Huntress Catches SmarterMail Account Takeover Leading to RCE
09
Mar
2026

Huntress Catches SmarterMail Account Takeover Leading to RCE

Background / Summary  The Huntress DE&TH (Detection Engineering and Threat Hunting) Team has observed in-the-wild exploitation of a privileged account…

How Huntress Managed ITDR's New Incident Report Timeline Changes Response
09
Mar
2026

How Huntress Managed ITDR’s New Incident Report Timeline Changes Response

Data exfiltration has quietly become one of the fastest-moving—and most damaging—outcomes of modern cyberattacks. Today’s attackers aren’t breaking in and…

Navigating Through The Fog - The DFIR Report
09
Mar
2026

Navigating Through The Fog – The DFIR Report

Key Takeaways An open directory associated with a ransomware affiliate, likely linked to the Fog ransomware group, was discovered in…

The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs
09
Mar
2026

The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs

The story so far In Part 1, we learned that Impacket’s LDAP reconnaissance tools use OID-based filters that get transformed…

Screenshot of Moltbook front page, A Social Network for AI Agents
09
Mar
2026

I pretended to be an AI agent on Moltbook so you don’t have to

I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found…

Why strong auth could fail at SaaS session integrity
09
Mar
2026

Why strong auth could fail at SaaS session integrity

As security professionals, we have spent the better part of a decade building the ultimate digital fortress. We deployed FIDO2,…

A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in February 2026.
08
Mar
2026

February 2026 Microsoft Patch Tuesday

2Critical 51Important 1Moderate 0Low Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that…

Tenable Cloud Risk Report 2026 chart showing orgs with overprivileged IAM roles in AWS
08
Mar
2026

2026 Cloud security and AI security risk report

AI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities…