Kimsuky Abusing DMARC Protocol

The primary objective of Kimsuky is to gather intelligence on geopolitical developments, adversary foreign policy strategies, and any other information that could impact the interests of the DPRK.

Read More »
A man finds an open door in the middle of a storm and tsunami

AI Tools for Cybersecurity

With the plethora of new startups in the AI space, followed by numerous entrepreneurial efforts to find just the right market niche, we have all been inundated by “influencers” recommending the hottest new tool. Like the

Read More »

What to Watch For in 2024 Q3 & Q4

We will see a dangerous escalation in the use of AI by attackers in 2024 Q3. Attackers have developed increasingly sophisticated AI-powered tools and they are deploying them in targeted operations.

Read More »

Interoperability Village

OASIS-Open’s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability ‘Plugfest’ in the Washington, D.C. area on April 11th and 12th.

Read More »

Liberty is Not Easy

Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for freedom.
“What wisdom can you find that is greater than kindness?”

– Jean-Jacques Rousseau (1712-1778)

Read More »
Cyber security and online data protection with tacit secured encryption software . Concept of smart digital transformation and technology disruption that changes global trends in new information era

Why Use STIX2.1 In Your Products

The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a common language and framework for representing and exchanging cyber threat information.

Read More »

Threat Hunting with The Hive, Cortex and MISP

Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This comprehensive approach requires a structured and systematic process that includes several key steps.

Read More »
Translate »