Threat Briefings

Stay ahead of the latest cybersecurity threats with decrypted attack and threat insights designed to keep your organization secure and resilient.

Lucie Cardiet
and
How Attackers Move Through Hybrid Networks After the Initial Breach

Learn how attackers move laterally across hybrid networks, abusing identity, credentials, and legitimate tools to reach critical systems before launching ransomware or stealing data.

Read more
Lucie Cardiet
and
How Attackers Establish Persistence in Hybrid Environments

Learn how attackers maintain hidden access inside hybrid networks and how SOC teams can detect persistence before it leads to data theft or ransomware.

Read more
Lucie Cardiet
and
What the Stryker Incident Reveals About Handala’s Attack Playbook

Inside the Stryker incident: how Handala likely moved from identity access to disruption, and the identity, scripting, and data transfer signals SOC teams should watch.

Read more

Videos

Threat Briefings
Threat Briefing: The NPM Exploit that Turned into a Self-Spreading Worm

Discover how the initial NPM exploit evolved into a self-spreading worm, Shai Hulud, and learn key lessons to protect your software supply chain.

Briefings

Insights straight to your inbox

Sign up for bi-weekly threat briefings and security research findings