SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

| | library, White Paper
Discover the Cutting-Edge of Cybersecurity in the “SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos” Are you navigating the complexities of threat hunting in today’s chaotic cyber landscape? SANS’s ninth annual Threat Hunting Survey offers unparalleled insights into the evolving practices, challenges, and methodologies shaping cybersecurity strategies across ... Read More

Threat-Informed Defense through Behavioral Threat Hunting

| | Blog
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This paradigm shift, underscored by the sophisticated methodology of Behavioral Threat Hunting, represents a critical juncture in cybersecurity’s maturation. Unlike conventional strategies anchored in the deployment ... Read More

Phobos Unleashed: Navigating the Maze of Ransomware’s Ever-Evolving Threat

Threat Overview – Phobos The Phobos Ransomware variant has been active since May of 2019, targeting a variety of entities that include governments, emergency services, critical infrastructure, education and public healthcare. Operating under a RaaS (Ransomware-as-a-Service) model, this ransomware variant has been responsible for the extortion of millions of dollars ... Read More
Episode 15

Episode 15

JOIN US FOR AN EVENING OF THREAT HUNTING FUN! Cyborg Security has launched a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they ... Read More

DarkCasino Strikes: Unveiling the Cyber Shadows of Water Hydra

| | Community Content
Threat Overview – DarkCasino The APT group, DarkCasino (also known as Water Hydra), has been in the wild since 2021 and has had operations observed targeting online trading platforms in Asia, the Middle East, and Europe. Examples of the specific targets are gambling websites, casinos, banks, cryptocurrency and stock trading ... Read More
Threat Hunting Workshop 10: Hunting for Initial Access

Threat Hunting Workshop 10: Hunting for Initial Access

Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Initial Access. This isn’t just another workshop; it’s an opportunity to immerse yourself in the world of advanced threat hunting, guided by the expertise of Cyborg Security’s seasoned ... Read More

MonikerLink: Outlook’s Achilles’ Heel, Navigating the Perilous Waters of CVE-2024-21413

| | Community Content
Threat Overview – #MonikerLink CVE-2024-21413 (MonikerLink) is a critical security vulnerability in the Microsoft Outlook software. This vulnerability, released by CheckPoint and Microsoft in February 2024, is suspected to impact all prior versions of Microsoft Outlook due to the method in which it interacts with COM API’s. CheckPoint research stated ... Read More
Threat Hunting Workshop 9: Hunting for Privilege Escalation

Threat Hunting Workshop 9: Hunting for Privilege Escalation

Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This isn’t just another workshop; it’s an opportunity to immerse yourself in the world of advanced threat hunting, guided by the expertise of Cyborg Security’s seasoned ... Read More
Episode 14

Episode 14

| | Upcoming Podcast
JOIN US FOR AN EVENING OF THREAT HUNTING FUN! Cyborg Security has launched a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they ... Read More

Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024

| | Blog
As we surge into 2024, the cybersecurity landscape is witnessing a paradigm shift. Gone are the days when Indicators of Compromise (IOCs) held the throne. 2023 marked the realization within cybersecurity circles that while IOCs serve a purpose, particularly in confirming participation in major breaches, their continuous monitoring leads to ... Read More

Secure Guardrails