Category: VendorResearch

How Threat Hunting and “Good” Metrics Help The Business
09
Mar
2026

How Threat Hunting and “Good” Metrics Help The Business

A threat hunting program backed by the right metrics and proper documentation of hunts can reduce breach costs and, in…

Born to bypass MFA: Taking down Tycoon 2FA
09
Mar
2026

Born to bypass MFA: Taking down Tycoon 2FA

Key takeaways The Tycoon 2FA phishing-as-a-service (PhaaS) platform has been widely used in phishing attacks that bypass multifactor authentication (MFA)…

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism
09
Mar
2026

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Putin Vs. Prigozhin The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely,…

From Reactive Defense to Threat Intelligence
09
Mar
2026

From Reactive Defense to Threat Intelligence

Ask any CISO in Latin America what keeps them up at night and you’ll hear the same answers: ransomware, payment…

09
Mar
2026

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

Today’s security leaders are operating in an environment of truncated cyberattack timelines with aging defenses built for slower, linear cyberthreats…

Timeline of Failed Successors to Breach, Raid Forums
09
Mar
2026

Timeline of Failed Successors to Breach, Raid Forums

Race to the bottom Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the…

Michael Raypold, VP of Engineering
09
Mar
2026

Michael Raypold, VP of Engineering

1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint…

Hamas and PIJ on Telegram
09
Mar
2026

Hamas and PIJ on Telegram

Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub…

09
Mar
2026

The 20 Coolest Web, Email And Application Security Companies Of 2026: The Security 100

From AI-powered vendors protecting email inboxes and web browsers, to providers of modern code security, here’s a look at 20…

CVE-2026-1731: Finding a critical RCE in an age of AI-driven vulnerability research
09
Mar
2026

CVE-2026-1731: Finding a critical RCE in an age of AI-driven vulnerability research

Introduction CVE-2026-1731 is an operating system (OS) command injection vulnerability impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)…

New threat actor, UAT-9921, leverages VoidLink framework in campaigns
08
Mar
2026

New threat actor, UAT-9921, leverages VoidLink framework in campaigns

Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in campaigns. Their activities may go as far back…

Fuzzing a single thread to uncover vulnerabilities
08
Mar
2026

Fuzzing a single thread to uncover vulnerabilities

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting…