Category: VendorResearch
A threat hunting program backed by the right metrics and proper documentation of hunts can reduce breach costs and, in…
Key takeaways The Tycoon 2FA phishing-as-a-service (PhaaS) platform has been widely used in phishing attacks that bypass multifactor authentication (MFA)…
Putin Vs. Prigozhin The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely,…
Ask any CISO in Latin America what keeps them up at night and you’ll hear the same answers: ransomware, payment…
Today’s security leaders are operating in an environment of truncated cyberattack timelines with aging defenses built for slower, linear cyberthreats…
Race to the bottom Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the…
1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint…
Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub…
From AI-powered vendors protecting email inboxes and web browsers, to providers of modern code security, here’s a look at 20…
Introduction CVE-2026-1731 is an operating system (OS) command injection vulnerability impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)…
Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in campaigns. Their activities may go as far back…
A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting…










