Skip to content

Procedures Make It Possible

At this year's Black Hat USA conference, Scott Small, Director of Cyber Threat Intelligence, and Harrison Van Riper,...

Akira Ransomware: A Case Study in Threat-Led Defense

In early August, incident responders from Artic Wolf, Huntress, and other vendors announced they had observed suspected...

Iran Cyber Threat Assessment and Defensive Guidance

As hostilities between Israel and Iran resumed earlier this month, sources warned of cyber activity stemming from the...

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat...

Build Resilience as Threat Actors Use AI to Lower the Barriers to Entry

Previously, we’ve covered how threat actors are using GenAI to lower the barrier to entry of existing forms of attack....