Beyond the Clouds: Safeguarding Our LEO Telecom Future from Cyber Sabotage
The cybersecurity landscape for LEO satcom systems is complex and requires a multifaceted approach to defense, including encryption, secure protocols, regular software…
Cyber observable threat hunting techniques.
The cybersecurity landscape for LEO satcom systems is complex and requires a multifaceted approach to defense, including encryption, secure protocols, regular software…
A Backdoor Trojan called by same antivirus firms 'Beaugrit' which has been active since 2017, has been identified beaconing out to a…
I was encouraged to find out that the most popular AI applications are actually extensions of existing tried and true tools that…
We will see a dangerous escalation in the use of AI by attackers in 2024 Q3. Attackers have developed increasingly sophisticated AI-powered…
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from…
This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber…
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…