I recently gave a presentation at SecTor on proactive threat hunting, which sparked some meaty conversations…
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
The final payload (BeaverTail) showed previously seen capabilities, including “usage of Axioms as embedded HTTP client,…
Critical Microsoft WSUS flaw exploited in wild after insufficient patch
“Starting around 2025-10-23 23:34 UTC, Huntress observed threat actors targeting WSUS instances publicly exposed on their…
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
However, Roger Grimesdata-driven defense CISO advisor at KnowBe4, said it’s “far from” the oddest phishing lure…
The best IAM tools
Manage identities in hybrid and multi-cloud environments control privileged accounts, Analyze login patterns based on risk…
The 10 biggest issues CISOs and cyber teams face today
“What’s occupying a ton of time for CISOs today is competing priorities,” he says. “The threat…
HubSpot’s 2025 State of Newsletters Report [data from 400+ newsletter pros]
The inbox is having her moment again. Newsletters have made a full-blown comeback, and the rules…
12 great examples of welcome emails for new customers [templates]
I’m going to say something that might ruffle a few feathers, but here it is: I’m…
6 brands that brilliantly differentiated from the competition, and how you can, too
There has never been a bigger moment in history when brand differentiation was more important. The…
Inside the AI Red Teaming CTF: What 200+ players taught us about breaking and defending LLMs
In our paper, Breaking Guardrails, Facing Walls, we analyzeai_gon3_rogu3, a 10‑day AI red teaming CTF co-run…