Discover how to create your own automated malware analysis environment you can deploy in minutes by combining powerful technologies in this hands-on guide.
Phishing-as-a-service on the rise, US says SQL injection vulnerabilities are unforgivable, and free VPN apps enable cybercrime in triaging the week 018.
Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this comprehensive guide.
Hackers focus on attacks through the web, CISA shares tips for defending critical infrastructure, and GitHub releases new feature in triaging the week 017.
Discover the best way of collecting intelligence, a collection management framework. This guide will teach you what they are and how to create one.
Microsoft SCCM vulnerable to attack, Tor releases new features, and Google Gemini AI comes under scrutiny in triaging the week 016.
Learn how to use the cyber kill chain. A fundamental framework for understanding cyber attacks, analyzing intrusions, and planning cyber defenses.
Phobos ransomware strikes critical infrastructure, the NSA teaches how to reach zero-trust, and hackers abuse QEMU in triaging the week 015
Learn about the top 5 challenges when creating intelligence requirements and strategies you can use to overcome them in this guide.
New threat intelligence reports released, Russia moves to hacking the cloud, and NIST updates its cyber security framework in triaging the week 014.
Discover how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code (IaC).
Google open source AI tool, crackdown on LockBit ransomware, and new attacks that manipulate virtual assistants in triaging the week 013.
Learn about the Courses of Action matrix (CoA) and how it can help your organization accurately assess its defensive capabilities and improve resiliency.
Big bounty offered for ransomware leaders, malware gets more sophisticated, and a critical vulnerability in Zoom in triaging the week 012.
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.