Remember the old Friday threat hunt?
Cold coffee. Too many tabs. One ugly query. Notes you swore you’d clean up later.
Threat hunters can start using AI *today* in 3 simple ways:
#AlphaHunt #ThreatHunting #CyberSecurity #AI
RobinReach
APT28 harvested Microsoft Office tokens from 200+ organisations by redirecting router DNS. No malware, no direct breach, no alerts. The stolen tokens end up inside your environment. The only way to catch it is by hunting for what the attacker does next.
Never Hunt Alone.
#ThreatHunting #APT28
Originally from Unit 42: A Deep Dive Into Attempted Exploitation of CVE-2023-33538 ( :-{ı▓ #unit42 #threathunting #cyberresearch
Malwoverview 8.0.1 is available:
github.com/alexandrebor...
To update it:
python -m pip install -U malwoverview
#threathunting #malware #cve #vulnerability #cybersecurity #informationsecurity #incidentresponse
Following up on an excellent blog post we discovered (linked in thread), we dug a little deeper on a recent #WordPress plugin compromise. We have more IoCs, and evidence of initial access auctions via the blockchain.
discourse.ifin.netwo...
#ThreatIntel #ThreatIntelligence #ThreatHunting #IFIN
RobinReach
APT37 ran a months long espionage campaign that started with a Facebook friend request, built trust, then delivered malware inside legitimate software. No email to filter, no link to block. Automated defences catch technical indicators, not trust.
Never Hunt Alone
#Cyber #ThreatHunting #APT37
21 IPs generated nearly half of all RDP scanning on the internet in 48 hours. Then vanished — for the second time in 30 days.
🔗 www.greynoise.io/blog/ip-addresses-behind...
#ThreatIntel #RDP #CyberSecurity #InfoSec #ThreatHunting
21 IPs generated nearly half of all RDP scanning on the internet in 48 hours. Then vanished — for the second time in 30 days.
🔗 www.greynoise.io/blog/ip-addr...
#ThreatIntel #RDP #CyberSecurity #InfoSec #ThreatHunting
What vibe hunting gets right about AI threat hunting, and where it breaks down
What vibe hunting gets right about AI threat hunting, and where it breaks down
📖 Read more: www.helpnetsecurity.com/2026/04/10/a...
#cyebersecurity #cybersecuritynews #AI #LLMs #threathunting
The cybersecurity certification landscape
negativepid.blog/the...
#defensiveSecurity #threatHunting #forensics #offensiveSecurity #ethicalHacking #cybersecurityCareers #cybersecurityCerts #certifications #Cybersecurity #ITcareers #onlineSecurity #negativepid
Originally from Unit 42: Cracks in the Bedrock: Agent God Mode ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox ( :-{ı▓ #unit42 #threathunting #cyberresearch
RobinReach
Nation state group TA416 changed attack approaches multiple times per campaign and stayed hidden for 600+ days.
Can autonomous SOCs keep up? Analysts can, with the right tools guiding them. That is what Huntbase was built for.
Never Hunt Alone
#Dwell #Cyber #ThreatHunting
Originally from Unit 42: Understanding Current Threats to Kubernetes Environments ( :-{ı▓ #unit42 #threathunting #cyberresearch
I just published Hunting APT29 Part 3: I Traced the Process Tree Back to the Beginning systemweakness.com/hunting-apt2...
#Cybersecurity #Substack #APT #ThreatHunting #DetectionEngineering #Splunk #Analysis
New article soon 👀🐱🐭 Cat and mouse, but make it cyber. Security chases what it can see. The attacker slips underneath it all with the laptop.
#Cybersecurity #DFIR #BlueTeam #RedTeam #VMware #vSphere #ThreatHunting #DetectionEngineering #InfoSec #IncidentResponse
iT4iNT SERVER Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools VDS VPS Cloud #Ransomware #CyberSecurity #EDR #ThreatHunting #Malware
Originally from Unit 42: Double Agents: Exposing Security Blind Spots in GCP Vertex AI ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications ( :-{ı▓ #unit42 #threathunting #cyberresearch
🔗 blog.lobsec.com/2026...
#Cybersecurity #DevSecOps #MalwareAnalysis #npm #InfoSec #ThreatHunting
Originally from Unit 42: Threat Brief: Widespread Impact of the Axios Supply Chain Attack ( :-{ı▓ #unit42 #threathunting #cyberresearch
BSides Luxembourg talk announcement!
🐧🚨 𝗡𝗢𝗧 𝗦𝗢 𝗛𝗔𝗥𝗠𝗟𝗘𝗦𝗦: 𝗧𝗛𝗘 𝗛𝗜𝗗𝗗𝗘𝗡 𝗪𝗢𝗥𝗟𝗗 𝗢𝗙 𝗟𝗜𝗡𝗨𝗫 𝗣𝗔𝗖𝗞𝗘𝗥𝗦 𝗔𝗡𝗗 𝗗𝗘𝗧𝗘𝗖𝗧𝗜𝗢𝗡 𝗖𝗛𝗔𝗟𝗟𝗘𝗡𝗚𝗘𝗦 - 𝗠𝗔𝗦𝗦𝗜𝗠𝗢 𝗕𝗘𝗥𝗧𝗢𝗖𝗖𝗛𝗜 🛡️🔍
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation […]
[Original post on infosec.exchange]
RobinReach
Happy Easter to those that celebrate!
From all at Huntbase ❤️
Never Hunt Alone
#CyberSecurity #InfoSec #ThreatHunting #HappyEaster
Originally from Unit 42: Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure ( :-{ı▓ #unit42 #threathunting #cyberresearch
Everyone’s bragging about faster MTTR while attackers sit in SaaS via tokens and “trusted” OAuth apps. You don’t fix that with more alerts; you fix it with a small set of hunts you actually run.
#ThreatHunting #AlphaHunt
RobinReach
A new RSAC report maps eight phases of modern intrusions. One thing is consistent: attacks aren't at the perimeter anymore. They exploit the gap between what your tools see and what's actually happening.
That's a threat hunting problem.
#ThreatHunting #InfoSec #CyberSecurity
The cybersecurity certification landscape
negativepid.blog/the...
#defensiveSecurity #threatHunting #forensics #offensiveSecurity #ethicalHacking #cybersecurityCareers #cybersecurityCerts #certifications #Cybersecurity #ITcareers #onlineSecurity #negativepid
PART 2 is LIVE: open.substack.com/pub/manishra...
#Substack #Bluesky #Sysmon #Splunk #Cybersecurity #ThreatHunting #DetectionEngineering #APT29
Just Announced for BSides Luxembourg 2026!
𝗔𝗗𝗩𝗔𝗡𝗖𝗘𝗗 𝗧𝗛𝗥𝗘𝗔𝗧 𝗛𝗨𝗡𝗧𝗜𝗡𝗚: 𝗦𝗧𝗔𝗬𝗜𝗡𝗚 𝗢𝗡𝗘 𝗦𝗧𝗘𝗣 𝗔𝗛𝗘𝗔𝗗 𝗢𝗙 𝗔𝗗𝗩𝗘𝗥𝗦𝗔𝗥𝗬 - Alex Holden
Cyber defenders must go beyond reactive security as attackers constantly evolve their tactics. This session dives into real-world attack […]
[Original post on infosec.exchange]