Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOCAST LIVE ZERO ASSUMPTIONS: A Threat Intel Roundtable

The threat landscape is evolving faster than ever, and with geopolitical tensions rising globally, IT and security leaders need the latest information on how to remain ready and resilient. Join Arctic Wolf and the industry's leading experts to learn: Featuring: Ismael Valenzuela — VP, Threat Research and Intelligence, Arctic Wolf Markus Neis — Senior Principal Threat Intelligence Researcher, Arctic Wolf.
Featured Post

Keeping the Lights on: Cybersecurity Automation in Critical National Infrastructure

Ask anyone who was scheduled to fly in or out of London Heathrow airport in the UK on March 20 and 21 2025, and they'll tell you that disruption to critical national infrastructure (CNI) is no joke. A fire at a local electricity substation resulted in thousands of journey disruptions and cancellations as one of the world's busiest airports was closed and incoming planes were diverted to alternative locations. The knock-on effect of the closure continued for days, and lost tourism revenue for the UK.

Breaking the Intelligence Ceiling: CleanINTERNET® Horizon Changes Everything

Processing a million IOCs was once groundbreaking. Today, we’ve achieved something revolutionary: CleanINTERNET 6.0 Horizon. Our newest release of CleanINTERNET processes over ten billion IOCs with sextillion-range decisions per second at wire speed, that is 10x the previous capacity. Watch The Future of Your Defense to learn more about CleanINTERNET 6.0 Horizon This isn’t incremental improvement—it’s a complete reimagining.

Threat Actors Abuse NetBird in Spear-Phishing Campaign Targeting Finance Executives

Cybersecurity firm Trellix uncovered a sophisticated spear-phishing operation in late May 2025 that exploited NetBird, a legitimate open-source remote access platform, to infiltrate organizations worldwide.

Washington Post Recognizes ThreatQuotient with the Greater Washington Area Top Workplaces 2025 Award

ThreatQuotient has been awarded a Top Workplaces 2025 honor by Washington Top Workplaces. This nomination is based solely on employee feedback gathered through a third-party survey administered by employee engagement technology partner Energage LLC.

Building a Threat Intelligence Management Strategy with XDR

Is your security team stopping threats before they enter, or just reacting after damage happens? Because in the current era of advanced cyber threats, a reactive approach isn’t enough. There must be a proactive defense strategy, fueled by threat intelligence! Extended Detection and Response (XDR) solutions help organizations stop attackers, spot weaknesses, and stay protected with cyber threat intelligence data.

June 23, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: New MORE_EGGS campaign continues recruiting themes KTA032 (FIN6) has begun a new campaign using the MORE_EGGS JavaScript backdoor which continues its themes surrounding fake resumes leading to the malware deployment. The actor engaged with organization recruiters which led to emails containing a malicious domain (often containing the fake applicant’s first and last name). The domain contains several defense evasion techniques to avoid automated analysis tools from scanning.

Proof-of-Concept Exploit Observed for Critical Zero-Day

CVE-2025-32756 is a critical remote code execution (RCE) vulnerability affecting multiple Fortinet products, including FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. The flaw arises from a stack-based buffer overflow in the handling of the AuthHash cookie’s enc parameter within the /remote/hostcheck_validate HTTP endpoint.