GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed
An IAB campaign exploited leaked ASP.NET Machine Keys. We dissect the attacker’s infrastructure, campaign and offer takeaways for blue teams.
Read More03-01
An IAB campaign exploited leaked ASP.NET Machine Keys. We dissect the attacker’s infrastructure, campaign and offer takeaways for blue teams.
Read MoreIn this first part we are going through the basic terminology and concepts of a Detection-as-Code approach in Detection Engineering.
Read MoreFinally, CYBER GRU: Russian military intelligence in cyberspace, the new book that I announced some days ago, was published last
Read MoreIn May 2025, Cybereason Global Security Operations Center (GSOC) detected that threat actors have been hosting malicious WordPress websites to
Read MoreRead Coordinated Defense: Building an AI-powered, unified SOC, the new e-book on how organizations can unify security operations to better
Read MoreThe post Announcing Our Partnership with Threatray: Enhancing Detection Capabilities Together appeared first on Nextron Systems.Nextron SystemsRead More
Read MoreCloudflare’s SASE platform now offers egress policies by hostname, domain, content category, and application in open beta.The Cloudflare BlogRead More
Read MoreWe break down the types of attacks targeting e-commerce in 2025, the direct and indirect damage they cause, and how
Read MoreBERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia.
Read MoreFor the latest discoveries in cyber research for the week of 6th July, please download our Threat Intelligence Bulletin. TOP
Read More