Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism
Putin Vs. Prigozhin The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely, marking one of the most…
Putin Vs. Prigozhin The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely, marking one of the most…
Ask any CISO in Latin America what keeps them up at night and you’ll hear the same answers: ransomware, payment fraud, credential theft, supply chain…
Today’s security leaders are operating in an environment of truncated cyberattack timelines with aging defenses built for slower, linear cyberthreats that can no longer keep…
Race to the bottom Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the avatar of arrested administrator “pompompurin”…
1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint Firehose is a data-as-a-service solution…
Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub for Hamas and Palestinian Islamic…
From AI-powered vendors protecting email inboxes and web browsers, to providers of modern code security, here’s a look at 20 key companies in web, email…
Introduction CVE-2026-1731 is an operating system (OS) command injection vulnerability impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) software. These products are critical…
Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in campaigns. Their activities may go as far back as 2019, even without VoidLink.…
A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting from physical debugging to a…
October 7: Hamas attacks Israel In the midst of the Israel-Hamas War, which erupted with a surprising and devastating attack on October 7, 2023 that…
Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate every misuse or emergent behavior in AI systems. We can, however, identify what…