Category: ThreatIntelligence-IncidentResponse

Manage your Elastic security stack as code with the Elastic Stack Terraform provider — Elastic Security Labs
08
Mar
2026

Manage your Elastic security stack as code with the Elastic Stack Terraform provider — Elastic Security Labs

The Elastic Stack Terraform provider has reached a significant milestone. Starting with release v0.13.1, you can manage your Elastic security…

KongTuke FileFix Leads to New Interlock RAT Variant
08
Mar
2026

KongTuke FileFix Leads to New Interlock RAT Variant

Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware…

08
Mar
2026

Cloud Credential Misuse: Detection & Prevention Guide 2026

Key Takeaways Legitimate secret-scanning tools such as TruffleHog have been operationalized in real-world cloud attack campaigns. Attack progression commonly follows…

From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
08
Mar
2026

From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira

Detect case variation in command execution: Hunt for mixed-case command invocations like Cmd.eXE, CmD.Exe which may indicate evasion attempts Behavioral Correlation Rules Hunt…