Introducing HUNTER Tuning: a New Tool for Driving Behavioral Threat Hunt Detections
We’re excited to announce Tuning, a new utility in the Guided Threat Hunts feature of HUNTER, the industry’s leading library of behavioral hunt packages and…
We’re excited to announce Tuning, a new utility in the Guided Threat Hunts feature of HUNTER, the industry’s leading library of behavioral hunt packages and…
This LABScon talk explores how hacktivist activity is strategically leveraged by nation-states and mercenary groups to obscure intent, destabilize targets, and weaponize public narratives. SentinelLABS’…
Introduction A new threat actor has launched what appears to be a fake ransomware-as-a-service (RaaS) operation called 0APT. Over the last week, 0APT published a…
Stolen checks and the impact of Covid-19 Checks are one of the most vulnerable legacy payment methods. Check fraud can actively affect the bottom lines…
In this talk, Phobos Group’s Dan Tentler evolves his previous work on hotel room security by demonstrating a fully portable security system built on Home…
January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future’s Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in…
Effective exposure management begins by illuminating and hardening risks across the entire attack surface. Some of the most meaningful shifts in security happen quietly—when teams…
Lessons from Clop It’s been one month since the Clop ransomware group began exploiting the MOVEit vulnerability (CVE-2023-34362 (VulnDB ID: 322555) to claim nearly 100…
Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Proofpoint expanded rewards and protections…
A threat hunting program backed by the right metrics and proper documentation of hunts can reduce breach costs and, in the event of a breach,…
Key takeaways The Tycoon 2FA phishing-as-a-service (PhaaS) platform has been widely used in phishing attacks that bypass multifactor authentication (MFA) protections in credential-harvesting campaigns at…