Get MILBERT.ai FREE for 90 daysActivate Now

    Threat Hunting Insights

    Expert perspectives on cybersecurity trends, threat detection, and protecting your organization from modern adversaries.

    Subscribe via RSS
    Threat Intelligence

    CISA Got It Partially Right. Here's What They Missed.

    CISA published an advisory on endpoint management hardening after the Stryker wipe. Their Multi Admin Approval recommendation is a speed bump, not a wall. Here is what actually stops a Global Admin compromise: no standing privileges, PIM with Authentication Context, FIDO2 hardware keys, and automated session revocation.

    March 19, 20269 min read
    Detection Engineering, Threat Intelligence

    The Setup Was Already in Your Logs

    Iran was inside before the war started. How the March 6 server report connects to the Stryker wipe. The two-team MOIS playbook. What the 72-hour intelligence confirms. And the PIM Authentication Context gap that made it possible.

    March 14, 202610 min read
    Detection Engineering

    Handala Detection Pack v2: Pre-Positioning, PIM Gap, and Bulk Wipe Controls

    Five new Sigma rules and KQL queries for Microsoft Sentinel covering MuddyWater pre-positioning IOCs, the PIM Authentication Context gap, three-layer bulk wipe prevention, stale session detection, and Rclone exfil to MuddyWater cloud infrastructure.

    March 14, 20268 min read
    Threat Intelligence

    Iranian Threat Actor: Tools, Techniques, IOCs, and IOAs

    Full disclosure of a live Iranian operational server. Open directory on active threat actor infrastructure revealed custom attack tools, 11 CVEs, confirmed victims including EgyptAir and the Portuguese Immigration Service, and 280+ Israeli targets.

    March 14, 202615 min read
    Detection Engineering

    Iran-Linked Handala Wipes 56,000-Employee Medical Device Giant. Here's the Detection Pack.

    Handala weaponized Microsoft Intune to remotely wipe Stryker Corporation across 61 countries. We built 10 Sigma rules, KQL queries, and OpenSearch queries covering the full attack chain. Download the detection pack.

    March 12, 20268 min read
    Threat Intel

    The Snowflake Breach: How Missing MFA Handed Attackers the Keys to Everything

    Scattered Spider walked into Snowflake environments at Ticketmaster, AT&T, and Santander using stolen credentials. No zero-days. No malware. Just accounts without MFA. Here is the attack chain, what to look for in your logs, and what to fix.

    March 11, 202610 min read
    Threat Intel

    Q1 2026 Threat Landscape: The Pace Has Not Slowed

    Ransomware, phishing, and malware through the first 68 days of 2026. We tracked 2,522 ransomware claims across 81 groups, the continued rise of infostealers, and why the attack chain is running at scale.

    March 9, 202610 min read
    Threat Intel

    Browser-in-the-Browser Attacks Are the New Phishing Kit

    Browser-in-the-Browser (BitB) attacks make URL-checking advice useless. The URL looks perfect because the entire browser window is fake. Here is how they work, why your security stack misses them, and what defenders must monitor.

    March 5, 202610 min read
    Threat Intel

    Infostealers Are the Biggest Story in Cybersecurity Right Now. Your MFA Will Not Save You.

    Infostealer malware is everywhere — in Chrome extensions, WhatsApp, fake AI tools, and GitHub repos. Attackers are not breaking your MFA. They steal what comes after it. The target is the session.

    February 16, 202622 min read
    Threat Intel

    America's Cyber Defense Agency Is Burning Down and Nobody's Coming to Put It Out

    CISA lost a third of its staff and its acting leader uploaded sensitive docs to public ChatGPT — while China sits inside U.S. critical infrastructure.

    February 13, 202614 min read
    Threat Intel

    A Love Letter That Broke the Internet: The ILOVEYOU Worm, 26 Years Later

    The ILOVEYOU worm infected 50 million machines in 10 days. Full technical breakdown and why the same attack pattern still works today.

    February 10, 202615 min read
    Threat Intel

    The News Cycle Is Burning. Threat Actors Are Still Working.

    This has been our busiest week of 2026 so far. Chaos is cover. Confusion is opportunity. Fatigue is the best vulnerability scanner ever invented.

    February 6, 202610 min read
    Technical

    How to Detect AiTM Phishing Attacks

    AiTM attacks bypass MFA completely — attackers steal sessions while your tools see nothing wrong. Here is how to detect them.

    January 25, 20269 min read
    Education

    What is Threat Hunting? A Complete Guide

    Learn what threat hunting is, why it matters for your organization, and how proactive detection differs from traditional security monitoring.

    December 15, 20258 min read
    Product

    How MILBERT AI Stops Authentication Attacks Before They Happen

    Discover how our agentic AI platform detects credential stuffing, password spraying, and other authentication attacks in real-time.

    November 28, 20256 min read
    Threat Intel

    2024 Threat Landscape: Key Trends We're Seeing

    Our hunt teams share the most significant attack patterns and threat actor behaviors observed across our client base this year.

    October 20, 20247 min read