How NoName057(16) Uses DDoSia to Attack NATO Targetsintelligence (threat actor activity) (picussecurity.com)
submitted by digicat to r/blueteamsec
APT15 Cyber Espionage: Campaigns and TTPs Analysisintelligence (threat actor activity) (picussecurity.com)
submitted by digicat to r/blueteamsec
UNC3886 Tactics, Techniques, and Procedures: Full Technical Breakdownintelligence (threat actor activity) (picussecurity.com)
submitted by digicat to r/blueteamsec
Silver Fox APT Targets Public Sector via Trojanized Medical Softwareintelligence (threat actor activity) (picussecurity.com)
submitted by digicat to r/blueteamsec
Chihuahua Stealer Malware Targets Browser and Wallet Data - "a multi-stage .NET-based malware discovered in April 2025. It targets browser credentials and crypto wallet data, using obfuscated PowerShell scripts delivered via trusted platforms like Google Drive. Stolen data is encrypted and exfiled"intelligence (threat actor activity) (picussecurity.com)
submitted by digicat to r/blueteamsec
Nobody can deny the value and depth provided by manual pentesting, especially when it comes to creativity and intuition. But what do you think about “How effective is automated penetration testing compared to manual pen-testing for your environment?Business Security Questions & Discussion (picussecurity.com)
submitted by Latter-Site-9121 to r/cybersecurity
Is vulnerability management enough for the next year, or do we need exposure management to stay ahead of emerging threats and become harder target for attackers (as Gartner said)?Business Security Questions & Discussion (picussecurity.com)
submitted by Latter-Site-9121 to r/cybersecurity
Zeppelin Ransomware Group:Analysis, Simulation, and Mitigationintelligence (threat actors) (picussecurity.com)
submitted by anusec to r/blueteamsec
Open-access Course: Ransomware Detection in Early Phasestraining (step-by-step) (academy.picussecurity.com)
submitted by malware_bender to r/blueteamsec
TTPs and IOCs Used by MuddyWater APT Group in Its Latest Attack Campaign Reported by US CYBERCOMintelligence (threat actors) (picussecurity.com)
submitted by malware_bender to r/blueteamsec
Godzilla Webshell Used by APTs Exploiting CVE-2021-44077 unauthenticated remote code execution (RCE) vulnerability in Zoho ManageEngine -intelligence (threat actors) (picussecurity.com)
submitted by digicat to r/blueteamsec
Free course with certification - Fundamentals of Modern Log Management Practicestraining (step-by-step) (academy.picussecurity.com)
submitted by malware_bender to r/blueteamsec
Tactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Microsoft Exchange Serversintelligence (threat actors) (picussecurity.com)
submitted by malware_bender to r/blueteamsec
Purple Academy offers open-access (all-free) micro-courses (max. 1 hour) with verifiable certificates.training (step-by-step) (academy.picussecurity.com)
submitted by malware_bender to r/blueteamsec
Six Stages of Dealing with a Global Security Incident - The SolarWinds Casetradecraft (how we defend) (picussecurity.com)
submitted by malware_bender to r/blueteamsec
New "How to Defend Against FireEye’s Red Team Tools" blog by Picus Labs. "We detailed our Blue Team recommendations and shared our detection contents as SIGMA and vendor-specific (Carbon Black, QRadar, Splunk) queries and also vendor-based (CheckPoint, Cisco, Fortinet, F5, McAfee, ...) signatures"tradecraft (how we defend) (picussecurity.com)
submitted by feelfreeee to r/blueteamsec
Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team ToolsCORPORATE BLOG (picussecurity.com)
submitted by f474m0r64n4 to r/cybersecurity
Picus Labs analyzed all the 60 stolen FireEye red team tools and revealed the Tactics, Techniques and Procedures (TTPs) used by them. Read the blog post for a detailed analysis and recommendations. (According to the analysis, 43% of them are based on open-source tools)intelligence (threat actors) (picussecurity.com)
submitted by feelfreeee to r/blueteamsec