Originally from Unit 42: Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government ( :-{ı▓ #unit42 #threathunting #cyberresearch
RobinReach
GlassWorm hides behind trusted dev accounts, legit services and a fake Google Docs extension. Every stage looks clean on its own. The attack only surfaces when you connect the dots.
That's a threat hunting problem.
#ThreatHunting #GlassWorm #InfoSec
Your SOC isn’t understaffed—it’s just fashionably late. While headlines scream disruption, attackers are still winning with OAuth, tokens, and “normal” exports. Revoking in 22 min beats writing a 22-page postmortem. 🚨😏
#AlphaHunt #CyberSecurity #ThreatHunting #IdentitySecurity
14 days later → Cerber ransomware.
Full hunt + IR report + every SPL query:
github.com/TensionFund/...
#cybersecurity #threathunting #splunk #infosec
Originally from Unit 42: Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team ( :-{ı▓ #unit42 #threathunting #cyberresearch
RobinReach
90 zero-days exploited last year.
Nearly half targeted firewalls, VPNs and security appliances; devices that don't run endpoint detection.
Once compromised, they're invisible.
If your tools can't see it, you're already exposed.
Never Hunt Alone
#cybersecurity #threathunting
Originally from Unit 42: Google Authenticator: The Hidden Mechanisms of Passwordless Authentication ( :-{ı▓ #unit42 #threathunting #cyberresearch
Managed Detection and Response (MDR): Strengthening Cybersecurity with Proactive Threat Defense
Click here For More: qksgroup.com/market-resea...
#ManagedDetectionAndResponse #MDR #Cybersecurity #ThreatDetection #IncidentResponse #ThreatHunting #SecurityOperations #SOC #CyberThreats
DriverShield is live — a free platform for analyzing Windows kernel drivers (.sys) for vulnerabilities, rootkit behavior, and BYOVD attack patterns.
200+ drivers already analyzed through our 14-stage inspection pipeline. API Available.
drivershield.io
#infosec #cybersecurity #BYOVD #threathunting
𝗔𝗡𝗔𝗟𝗬𝗭𝗘 𝗔𝗡𝗗 𝗛𝗨𝗡𝗧 𝗗𝗣𝗥𝗞 𝗔𝗧𝗧𝗔𝗖𝗞𝗦 (2h Workshop) Rakesh Krishnan (@rakeshkrish12)
This workshop delivers a focused overview of advanced techniques for detecting and analyzing cyber threats from North Korea (DPRK). Participants will explore methods such as […]
[Original post on infosec.exchange]
Risky Business #podcast risky.biz/RB827/ recently discussed Nebulock's #agentic #threathunting #framework that maintains a memory of previous hunts. Very clever use of #AI to support #security staff.
github.com/Nebulock-Inc...
Malwoverview v8.0 (codename: Revolutions)
Malwoverview v8.0 (codename: Revolutions) has been released:
github.com/alexandrebor...
To install its complete version: pip install malwoverview[all]
#threathunting #malware #vulnerability #ai #informationsecurity #cybersecurity #cve
Originally from Unit 42: Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization ( :-{ı▓ #unit42 #threathunting #cyberresearch
Just uploaded the 2nd Part of DLL Hijacking on #Substack
Where I analyzed real malware logs and discovered why non-admin users can execute code without triggering a single alert.
Link: substack.com/@manishrawat...
#Infosec #Detection #ThreatHunting #Splunk #Cybersecurity
Originally from Unit 42: Who’s Really Shopping? Retail Fraud in the Age of Agentic AI ( :-{ı▓ #unit42 #threathunting #cyberresearch
Attackers don’t need malware—just your OAuth token. If you can’t revoke access in 30 min, congrats: you’re running a “museum SOC.” 🔥 3 kill-switches + a 90‑day intel-led hunt loop cuts dwell time.
#AlphaHunt #CyberSecurity #ThreatHunting #IdentitySecurity
Originally from Unit 42: Analyzing the Current State of AI Use in Malware ( :-{ı▓ #unit42 #threathunting #cyberresearch
VEN0m ransomware uses BYOVD (IMFForceDelete.sys) to kill AV/EDR before encrypting files.
We provide a summary of the threat to help your teams from executive to analysts.
www.focusedhunts.com/blog/hunting...
#ThreatHunting #Ransomware #BYOVD #BlueTeam #FocusedHunts #HuntingOffTheRed #HOTR
Most #CTI programs describe the threat. Few can prove their defenses hold against it.
Nigel Boston wrote the CTI Fusion Playbook for doing exposure validation across #ThreatHunting, #Detection, #RedTeam, and #SOC, with a scoring model and templates included.
feedly.com/ti-essential...
Originally from Unit 42: Navigating Security Tradeoffs of AI Agents ( :-{ı▓ #unit42 #threathunting #cyberresearch
SOC Analyst Hub — Tier 1 bundles 5 playbooks, decision trees for alert classification/escalation, structured hunting hypotheses, and a 4‑week Tier 1 learning path. #ThreatHunting #IR #SOC https://bit.ly/4sYoieN
RobinReach
New blog from Jeff Hamm tracing threat hunting back to before the term even existed. What it really entails and why structure and frameworks matter now more than ever.
Never Hunt Alone
#ThreatHunting #CyberMarketing #InfoSecs #CyberSecurity
Blog Link in comments
Originally from Unit 42: Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models ( :-{ı▓ #unit42 #threathunting #potatoresearch
Originally from Unit 42: Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models ( :-{ı▓ #unit42 #threathunting #cyberresearch
Read more:
www.technadu.com/commonwealth...
💬 What do you think - should companies build their own AI security tools or rely on vendors?
#Cybersecurity #AI #Infosec #ThreatHunting
Originally from Unit 42: Boggy Serpens Threat Assessment ( :-{ı▓ #unit42 #threathunting #cyberresearch
Incident responders are frontline defenders against #cyberattacks. To excel, they need skills in log analysis, #ThreatHunting & #IncidentResponse planning. Certifications like GCIH, ECIH, & CySA+ can boost their expertise & career growth. #CyberSecurity https://bit.ly/4bm72c6
RobinReach
A state-linked campaign breached 50+ telcos across 42 countries using cloud features as C2 — one backdoor used Google Sheets. No SIEM catches this.
Finding it takes hypotheses and telemetry. That's threat hunting.
Never Hunt Alone
#threathunting #nationstate #cloudsecurity
Pi Day reminder: attackers don’t need 0days—just your OAuth tokens. If you can’t revoke a grant in <30 min, your SOC isn’t “lean”… it’s asleep. 🥧🔪
Read the 90‑day playbook (3 kill-switches, 4 hunts): blog.alphahunt.io/the-90-day-d...
#AlphaHunt #CyberSecurity #ThreatHunting #IdentitySecurity
From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF