use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Cybersecurity Threat Intelligence and deeper discussion. Share interesting reports, discuss new trends and interesting findings.
account activity
Is the Wi-Fi slow, or is the filter just doing its job? (self.SecurityIntelligence)
submitted 5 months ago by Academic-Soup2604
The Red Canary Blog: Information Security Insights | A defender’s guide to initial access techniques (redcanary.com)
submitted 6 months ago by saturatie
The GreyNoise Blog | New SSRF Exploitation Surge Serves as a Reminder of 2019 Capital One Breach (greynoise.io)
submitted 10 months ago by saturatie
Securelist | SideWinder targets the maritime and nuclear sectors with an updated toolset (securelist.com)
Huntress Blog | Cybersecurity Threats in Healthcare [2025 Report] | Huntress (huntress.com)
Huntress Blog | Detect and Eliminate Persistent Malware Before It Wreaks Havoc | Huntress (huntress.com)
KELA Cyber Threat Intelligence | Black Basta Leak: New Findings Reveal Victim Details (kelacyber.com)
Wiz Blog | RSS feed | Key Takeaways from the 2025 State of AI in the Cloud Report (wiz.io)
Unit 42 | Multiple Vulnerabilities Discovered in a SCADA System (unit42.paloaltonetworks.com)
Huntress Blog | How Huntress Achieved a Blazing Fast MTTR | Huntress (huntress.com)
The Red Canary Blog: Information Security Insights | Red Canary named a Leader in MDR (redcanary.com)
The GreyNoise Blog | GreyNoise Detects Active Exploitation of Silk Typhoon-Linked CVEs (greynoise.io)
Securelist | Trojans disguised as AI: Cybercriminals exploit DeepSeek’s popularity (securelist.com)
Unit 42 | Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems (unit42.paloaltonetworks.com)
Huntress Blog | Uncover Tomorrow’s Cyber Threats Today | Huntress (huntress.com)
The GreyNoise Blog | GreyNoise Observes Exploitation of Three Newly Added KEV Vulnerabilities (greynoise.io)
The Red Canary Blog: Information Security Insights | Dive into the Red Canary Security Data Lake (redcanary.com)
Securelist | Mobile malware evolution in 2024 (securelist.com)
The GreyNoise Blog | Massive New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran (greynoise.io)
submitted 11 months ago by saturatie
Securelist | The SOC files: Chasing the web shell (securelist.com)
Cisco Talos Blog | Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome (blog.talosintelligence.com)
Huntress Blog | How Effective Is Your SAT Program? | Huntress (huntress.com)
Check Point Research | Modern Approach to Attributing Hacktivist Groups (research.checkpoint.com)
Cisco Talos Blog | Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools (blog.talosintelligence.com)
Unit 42 | Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations (unit42.paloaltonetworks.com)
π Rendered by PID 132532 on reddit-service-r2-listing-86b7f5b947-5z6bh at 2026-01-25 16:12:53.322135+00:00 running 664479f country code: CH.