Threat Hunting Insights

    Expert perspectives on cybersecurity trends, threat detection, and protecting your organization from modern adversaries.

    Subscribe via RSS
    CMMC

    CMMC Domain 1: Access Control, the One Everyone Underestimates

    Post one of fourteen. Access Control is the foundation. If you mess it up, none of the other thirteen domains save you, because the bad guy is already inside your environment looking at CUI.

    April 28, 20267 min read
    Detection Engineering

    Pull the Power Cord: FIRESTARTER, AR26-113A, and a Backdoor That Survives Your Patches

    CISA and NCSC co-released a Malware Analysis Report today on a Cisco ASA/Firepower backdoor that patching does not remove. Here is what it does, why Sigma will not save you, and what to do this week.

    April 23, 20269 min read
    Compliance

    The November 2026 Cliff Is Real. The Small Shops Are Going Over It First.

    Phase 2 of CMMC begins November 10, 2026. No Level 2 certification means no contract, no option year, no extension. The small shops that actually build America’s weapons do not have six-person compliance teams. They have Dave. Here is what we built for them.

    April 21, 20269 min read
    Detection Engineering

    Stryker, Handala, MOIS, and MuddyWater: The Full Kill Chain and the Unified Detection Pack (v3)

    The definitive brief on the Stryker attack. Two MOIS teams, one kill chain: MuddyWater pre-positioned for weeks, Handala pulled the trigger via Intune. Detection Pack v3 ships 25 rules covering every phase. Full IOC set and configuration hardening included.

    April 16, 202618 min read
    Patch Tuesday

    Microsoft Patch Tuesday April 2026: 167 CVEs, Active SharePoint Zero-Day, and Wormable Networking RCEs

    April 2026 Patch Tuesday is the largest in years: 167 CVEs from Microsoft plus 344 released throughout the month for 512 total updates. An actively exploited SharePoint zero-day, wormable RCEs in Remote Desktop and Active Directory, and preview-pane Office exploits demand immediate action.

    April 14, 202614 min read
    Product Updates

    We Built JAXBERT Because Small Defense Contractors Deserve Better Than a $200K Consulting Bill

    The CMMC Level 2 deadline is real. Consulting firms charge $80K-$200K to hand you a binder. JAXBERT is a purpose-built platform that walks defense contractors through every step of compliance, from assessment to C3PAO package.

    April 9, 20265 min read
    Threat Intelligence

    CISA Got It Partially Right. Here's What They Missed.

    CISA published an advisory on endpoint management hardening after the Stryker wipe. Their Multi Admin Approval recommendation is a speed bump, not a wall. Here is what actually stops a Global Admin compromise: no standing privileges, PIM with Authentication Context, FIDO2 hardware keys, and automated session revocation.

    March 19, 20269 min read
    Detection Engineering, Threat Intelligence

    The Setup Was Already in Your Logs

    Iran was inside before the war started. How the March 6 server report connects to the Stryker wipe. The two-team MOIS playbook. What the 72-hour intelligence confirms. And the PIM Authentication Context gap that made it possible.

    March 14, 202610 min read
    Detection Engineering

    Handala Detection Pack v2: Pre-Positioning, PIM Gap, and Bulk Wipe Controls

    Five new Sigma rules and KQL queries for Microsoft Sentinel covering MuddyWater pre-positioning IOCs, the PIM Authentication Context gap, three-layer bulk wipe prevention, stale session detection, and Rclone exfil to MuddyWater cloud infrastructure.

    March 14, 20268 min read
    Threat Intelligence

    Iranian Threat Actor: Tools, Techniques, IOCs, and IOAs

    Full disclosure of a live Iranian operational server. Open directory on active threat actor infrastructure revealed custom attack tools, 11 CVEs, confirmed victims including EgyptAir and the Portuguese Immigration Service, and 280+ Israeli targets.

    March 14, 202615 min read
    Detection Engineering

    Iran-Linked Handala Wipes 56,000-Employee Medical Device Giant. Here's the Detection Pack.

    Handala weaponized Microsoft Intune to remotely wipe Stryker Corporation across 61 countries. We built 10 Sigma rules, KQL queries, and OpenSearch queries covering the full attack chain. Download the detection pack.

    March 12, 20268 min read
    Threat Intel

    The Snowflake Breach: How Missing MFA Handed Attackers the Keys to Everything

    Scattered Spider walked into Snowflake environments at Ticketmaster, AT&T, and Santander using stolen credentials. No zero-days. No malware. Just accounts without MFA. Here is the attack chain, what to look for in your logs, and what to fix.

    March 11, 202610 min read
    Patch Tuesday

    Microsoft Patch Tuesday March 2026: 86 CVEs, 2 Zero-Days, and a SQL Server Escalation You Cannot Ignore

    March 2026 Patch Tuesday delivers 86 CVEs including 10 Critical and 2 publicly disclosed zero-days. A SQL Server privilege escalation grants sysadmin over the network, and a Microsoft Authenticator info disclosure threatens MFA integrity. Here is what to patch first.

    March 10, 202610 min read
    Threat Intel

    Q1 2026 Threat Landscape: The Pace Has Not Slowed

    Ransomware, phishing, and malware through the first 68 days of 2026. We tracked 2,522 ransomware claims across 81 groups, the continued rise of infostealers, and why the attack chain is running at scale.

    March 9, 202610 min read
    Threat Intel

    Browser-in-the-Browser Attacks Are the New Phishing Kit

    Browser-in-the-Browser (BitB) attacks make URL-checking advice useless. The URL looks perfect because the entire browser window is fake. Here is how they work, why your security stack misses them, and what defenders must monitor.

    March 5, 202610 min read
    Threat Intel

    Infostealers Are the Biggest Story in Cybersecurity Right Now. Your MFA Will Not Save You.

    Infostealer malware is everywhere — in Chrome extensions, WhatsApp, fake AI tools, and GitHub repos. Attackers are not breaking your MFA. They steal what comes after it. The target is the session.

    February 16, 202622 min read
    Threat Intel

    America's Cyber Defense Agency Is Burning Down and Nobody's Coming to Put It Out

    CISA lost a third of its staff and its acting leader uploaded sensitive docs to public ChatGPT — while China sits inside U.S. critical infrastructure.

    February 13, 202614 min read
    Threat Intel

    A Love Letter That Broke the Internet: The ILOVEYOU Worm, 26 Years Later

    The ILOVEYOU worm infected 50 million machines in 10 days. Full technical breakdown and why the same attack pattern still works today.

    February 10, 202615 min read
    Threat Intel

    The News Cycle Is Burning. Threat Actors Are Still Working.

    This has been our busiest week of 2026 so far. Chaos is cover. Confusion is opportunity. Fatigue is the best vulnerability scanner ever invented.

    February 6, 202610 min read
    Technical

    How to Detect AiTM Phishing Attacks

    AiTM attacks bypass MFA completely — attackers steal sessions while your tools see nothing wrong. Here is how to detect them.

    January 25, 20269 min read
    Education

    What is Threat Hunting? A Complete Guide

    Learn what threat hunting is, why it matters for your organization, and how proactive detection differs from traditional security monitoring.

    December 15, 20258 min read
    Product

    How MILBERT AI Stops Authentication Attacks Before They Happen

    Discover how our agentic AI platform detects credential stuffing, password spraying, and other authentication attacks in real-time.

    November 28, 20256 min read
    Threat Intel

    2024 Threat Landscape: Key Trends We're Seeing

    Our hunt teams share the most significant attack patterns and threat actor behaviors observed across our client base this year.

    October 20, 20247 min read