Identity is at the center of the fight against adversaries. As threat actors weaponize legitimate credentials and sell access to the highest bidders, organizations must proactively detect and secure exposed identities to shut down potential attack paths before they can be exploited. The CrowdStrike 2025 Global Threat Report illustrates the urgent need for strong identity … [Read more...] about How to Navigate the 2025 Identity Threat Landscape
Threat
Build Smarter Threat Detection with Next-Gen SIEM
SOC teams across businesses, industries, and geographies share the same goal: Stop cyberattacks before damage is done. But for those with legacy SIEMs, this goal is nearly impossible to achieve. While powerful, legacy SIEMs demand an overwhelming investment of time, resources, and expertise to set up and maintain. Legacy SIEMs force SOC teams to manually define every … [Read more...] about Build Smarter Threat Detection with Next-Gen SIEM
Understanding the Quantum Threat to Network Security
Confidentiality is a fundamental pillar of information security. In sensitive deployments, such as those involving federal governments, military and defense agencies, and large financial institutions, the demand for confidentiality extends well beyond the typical 5 to 10 years, often reaching 20 years or more. The same also applies to telecom operators and … [Read more...] about Understanding the Quantum Threat to Network Security
Cross-Domain Attack Defense with Intel-Led Threat Hunting
1. Initial Entry and Exploitation In the first stage of this attack, the adversary set up a command-and-control (C2-1 in Figure 1) infrastructure to launch their attack. They targeted a Linux Tomcat server, exploiting a known vulnerability to gain root access. Once inside, they conducted reconnaissance using standard tools like LDAP search to enumerate network shares and … [Read more...] about Cross-Domain Attack Defense with Intel-Led Threat Hunting
CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary
Today’s adversaries have long been accelerating and evolving their operations. Now they are developing a business-like structure, refining and scaling their successful strategies, and exploring new technologies to cultivate a more efficient approach to cyberattacks. 2024 was the year of the enterprising adversary. The CrowdStrike Global Threat Report delivers critical … [Read more...] about CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary
AI Threat Intelligence Roundup: February 2025
At Cisco, AI threat research is fundamental to informing the ways we evaluate and protect models. In a space that is dynamic and rapidly evolving, these efforts help ensure that our customers are protected against emerging vulnerabilities and adversarial techniques. This regular threat roundup shares useful highlights and critical intelligence from third-party threat … [Read more...] about AI Threat Intelligence Roundup: February 2025
AI Cyber Threat Intelligence Roundup: January 2025
At Cisco, AI threat research is fundamental to informing the ways we evaluate and protect models. In a space that is so dynamic and evolving so rapidly, these efforts help ensure that our customers are protected against emerging vulnerabilities and adversarial techniques. This regular threat roundup consolidates some useful highlights and critical intel from ongoing … [Read more...] about AI Cyber Threat Intelligence Roundup: January 2025
Top Threat Tactics and How to Address Them
Each quarter, Cisco Talos Incident Response publishes a summarized record of the notable trends from the cases they work. The attacks, techniques, and methodology that Talos observes helps to shape and inform many of the protections that Cisco’s customers use on a regular basis. Part of their work in this area helps promote Talos’ principle of see once, block … [Read more...] about Top Threat Tactics and How to Address Them
Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. "Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities," … [Read more...] about Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Streamlining threat intelligence reporting with Elastic AI Assistant
Giving valuable time back to threat intel analystsEmpowering analysts with AI-driven reportingIn the ever-evolving landscape of cybersecurity, threat analysts are constantly inundated with new threat intelligence (TI) data. The challenge lies not only in understanding and mitigating these threats but also in efficiently documenting and reporting them. Traditional methods of … [Read more...] about Streamlining threat intelligence reporting with Elastic AI Assistant