Threat Hunting Insights
Expert perspectives on cybersecurity trends, threat detection, and protecting your organization from modern adversaries.
Subscribe via RSSCISA Got It Partially Right. Here's What They Missed.
CISA published an advisory on endpoint management hardening after the Stryker wipe. Their Multi Admin Approval recommendation is a speed bump, not a wall. Here is what actually stops a Global Admin compromise: no standing privileges, PIM with Authentication Context, FIDO2 hardware keys, and automated session revocation.
The Setup Was Already in Your Logs
Iran was inside before the war started. How the March 6 server report connects to the Stryker wipe. The two-team MOIS playbook. What the 72-hour intelligence confirms. And the PIM Authentication Context gap that made it possible.
Handala Detection Pack v2: Pre-Positioning, PIM Gap, and Bulk Wipe Controls
Five new Sigma rules and KQL queries for Microsoft Sentinel covering MuddyWater pre-positioning IOCs, the PIM Authentication Context gap, three-layer bulk wipe prevention, stale session detection, and Rclone exfil to MuddyWater cloud infrastructure.
Iranian Threat Actor: Tools, Techniques, IOCs, and IOAs
Full disclosure of a live Iranian operational server. Open directory on active threat actor infrastructure revealed custom attack tools, 11 CVEs, confirmed victims including EgyptAir and the Portuguese Immigration Service, and 280+ Israeli targets.
Iran-Linked Handala Wipes 56,000-Employee Medical Device Giant. Here's the Detection Pack.
Handala weaponized Microsoft Intune to remotely wipe Stryker Corporation across 61 countries. We built 10 Sigma rules, KQL queries, and OpenSearch queries covering the full attack chain. Download the detection pack.
The Snowflake Breach: How Missing MFA Handed Attackers the Keys to Everything
Scattered Spider walked into Snowflake environments at Ticketmaster, AT&T, and Santander using stolen credentials. No zero-days. No malware. Just accounts without MFA. Here is the attack chain, what to look for in your logs, and what to fix.
Q1 2026 Threat Landscape: The Pace Has Not Slowed
Ransomware, phishing, and malware through the first 68 days of 2026. We tracked 2,522 ransomware claims across 81 groups, the continued rise of infostealers, and why the attack chain is running at scale.
Browser-in-the-Browser Attacks Are the New Phishing Kit
Browser-in-the-Browser (BitB) attacks make URL-checking advice useless. The URL looks perfect because the entire browser window is fake. Here is how they work, why your security stack misses them, and what defenders must monitor.
Infostealers Are the Biggest Story in Cybersecurity Right Now. Your MFA Will Not Save You.
Infostealer malware is everywhere — in Chrome extensions, WhatsApp, fake AI tools, and GitHub repos. Attackers are not breaking your MFA. They steal what comes after it. The target is the session.
America's Cyber Defense Agency Is Burning Down and Nobody's Coming to Put It Out
CISA lost a third of its staff and its acting leader uploaded sensitive docs to public ChatGPT — while China sits inside U.S. critical infrastructure.
A Love Letter That Broke the Internet: The ILOVEYOU Worm, 26 Years Later
The ILOVEYOU worm infected 50 million machines in 10 days. Full technical breakdown and why the same attack pattern still works today.
The News Cycle Is Burning. Threat Actors Are Still Working.
This has been our busiest week of 2026 so far. Chaos is cover. Confusion is opportunity. Fatigue is the best vulnerability scanner ever invented.
How to Detect AiTM Phishing Attacks
AiTM attacks bypass MFA completely — attackers steal sessions while your tools see nothing wrong. Here is how to detect them.
What is Threat Hunting? A Complete Guide
Learn what threat hunting is, why it matters for your organization, and how proactive detection differs from traditional security monitoring.
How MILBERT AI Stops Authentication Attacks Before They Happen
Discover how our agentic AI platform detects credential stuffing, password spraying, and other authentication attacks in real-time.
2024 Threat Landscape: Key Trends We're Seeing
Our hunt teams share the most significant attack patterns and threat actor behaviors observed across our client base this year.