Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Guide to working with auditors: Best practices for startups

Navigating an audit can be complex and time-consuming, but the right preparation and approach can make the process much smoother. Whether you're working toward SOC 2, ISO 27001, or another framework, knowing when to engage auditors, how to provide access, and what to focus on during the audit will set you up for success. ‍ In this guide, we’ll walk through best practices for working with auditors—from initial engagement to ongoing audit management and post-audit steps. ‍

Phishing Attacks Are Evolving - Is Your Email Security Keeping Up?

A strong email security posture is as much about culture as it is about technology. In the 2022-23 financial year, 78% of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39% of these businesses provided specialized training for privileged users who are authorized to perform security-relevant functions that ordinary users are not.

CMMC Level 2 Documentation: What Auditors Want to See

If you’re part of the defense industrial base and you’re seeking CMMC certification, there’s a very good chance you’re aiming for Level 2. Level 1 is mostly meant for businesses with a focus on federal contract information but not CUI, while Level 3 is meant for businesses handling the most sensitive kinds of CUI; since most businesses fall somewhere in the middle, Level 2 is the most common.

Logs Are for Campfires: Integrate and Innovate With Splunk Asset and Risk Intelligence

In the final entry of this blog series, we will discuss the challenges of managing assets and risks across multiple data systems. Then, we will discuss how Asset and Risk Intelligence integrates with multiple platforms to provide centralized visibility. From there, we will summarize the content of this blog post and go into a step by step guided demo. If you haven’t already, be sure to check out the first, second, and third entries in this series for more deep dives into Splunk ARI and its features.

Oracle Cloud Breach: OAM Exploit & T3 Protocol Clarified

Over the past few days, we have been in direct contact with a hacker who goes by the alias Rose87168. He claims to have breached Oracle Cloud systems, specifically targeting Oracle WebLogic and Oracle Access Manager (OAM). The hacker has provided us with multiple files and data samples, including a tree file and a 10,000-line dataset, which allegedly contain sensitive configuration files, user authentication data, and directory structures from Oracle's infrastructure.

Inside Anubis Ransomware: Tactics, Impact & Protection

Recently, a new ransomware group, Anubis, has emerged, making its presence known on Twitter. The Foresiet Threat Intel team monitored their activity and observed a new ransomware operation being advertised on their account. The group updated their profile picture and began posting about their latest breaches. Through analysis of their communication patterns and language, Foresiet has determined that the operators behind Anubis likely belong to a Russian-speaking threat group.

CoffeeLoader Malware: The Advanced Threat Evading Detection

The virtual world is ever-changing, as are the cybercriminals who continue to evolve in order to circumvent even the strongest security systems. The newest threat to hit the headlines is CoffeeLoader—a second-stage payload dropper designed to bypass endpoint security tools, digital forensic tools, and EDR (Endpoint Detection and Response) tools.

Detecting Fast Flux with Sysdig Secure and VirusTotal

On April 3, 2025, the National Security Agency and other partner agencies released a critical advisory about DNS and Fast Flux. They even called it a national security threat due to the potential dangers involved. In this article, we’ll go over what Fast Flux is and how Sysdig Secure detects this attack technique. We’ll also cover gathering potential Fast Flux domain names from VirusTotal.

A DLS EMERGEncy! - Record breaking extortion group DLS emergence in 2025

As the threat landscape continues to develop, ransomware and data broker groups constantly emerge, develop, and disband. Cyjax has observed a significant number of new data-leak sites (DLS) emerge in March 2025, with a total of 14 new sites. This is the highest observed number of extortion groups which have emerged in a single month. The second highest number was observed in September 2022, when 10 data-leak sites emerged. Overall, 21 DLSs have been identified in 2025 so far.

Top 33 Leaders in Threat Intelligence 2025

Leadership is the backbone of any successful operation, streamlining complex processes and ensuring that teams work with clarity and direction. In the fast-evolving world of threat intelligence, where vast amounts of data must be analysed and acted upon swiftly, strong leadership becomes even more crucial. As Stephen Covey said, “Effective leadership is putting first things first.