sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#threatdetection

5 Beiträge5 Beteiligte1 Beitrag heute
ECS Infotech Pvt. Ltd.<p>🔒 Protect what matters most!</p><p>Insider threats can put your business at serious risk. Our Insider Investigation Service helps you detect, prevent, and manage insider risks with expert solutions keeping your organization safe from within.</p><p>👉 Learn how to safeguard your business: <a href="https://www.ecsinfotech.com/insider-investigation-service-safeguarding-your-business-with-effective-insider-threat-detection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ecsinfotech.com/insider-invest</span><span class="invisible">igation-service-safeguarding-your-business-with-effective-insider-threat-detection/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InsiderThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InsiderThreat</span></a> <a href="https://infosec.exchange/tags/InsiderInvestigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InsiderInvestigation</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/BusinessProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessProtection</span></a> <a href="https://infosec.exchange/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://infosec.exchange/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
LimaCharlie<p>Purple Teaming Okta Detection Virtual Workshop happening this Wednesday!</p><p>Join other security engineers and SOC analysts for practical Okta detection engineering on September 3rd.</p><p>You'll get live demonstrations of Okta log ingestion, hands-on experience building custom detection rules for identity threats, and the chance to test your detections with adversary emulation tools in individual lab environments.</p><p>Stop relying on rigid vendor solutions and start building detection capabilities tailored to your environment.</p><p>Register: <a href="https://limacharlie.wistia.com/live/events/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=linkedin&amp;utm_medium=social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.wistia.com/live/ev</span><span class="invisible">ents/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=linkedin&amp;utm_medium=social</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>okta</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
InfoQ<p>⚠️ As <a href="https://techhub.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> attacks grow in frequency, scale, and sophistication, endpoint security &amp; reactive backups are no longer enough.</p><p>🔐 Defense has moved beyond traditional antivirus - the new focus is the storage layer:<br>✅ Immutable backups<br>✅ AI-powered detection<br>✅ Isolated vaults</p><p>📰 Read the <a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoQ</span></a> article by Arjun Mullick (Engineering Manager, Meta): <a href="https://bit.ly/4623E3x" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4623E3x</span><span class="invisible"></span></a></p><p><a href="https://techhub.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://techhub.social/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/SecurityVulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityVulnerabilities</span></a></p>
LimaCharlie<p>Less than a week left to register for our Purple Team Okta Detection Workshop!</p><p>Don't miss your chance to build real-world Okta detection capabilities using our SecOps Cloud Platform on September 3rd.</p><p>In this hands-on workshop, you'll learn to detect suspicious logins, privilege escalation, MFA bypasses, and more using your own dedicated lab environment.</p><p>Ready to take control of your identity security stack?</p><p>Save your seat: <a href="https://limacharlie.wistia.com/live/events/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=mastodon&amp;utm_medium=email" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.wistia.com/live/ev</span><span class="invisible">ents/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=mastodon&amp;utm_medium=email</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>okta</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
Josh Lemon<p>That's a bit nasty - a threat actor uses <a href="https://infosec.exchange/tags/Velociraptor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Velociraptor</span></a> (open source IR tool) as their primary C2 implant on the victim's system.</p><p>You think they might also let the victim use it for responding to the compromise as well? 😂<br> <a href="https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2025/08/</span><span class="invisible">26/velociraptor-incident-response-tool-abused-for-remote-access/</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Graylog<p>ScaryByte has tackled an important and growing challenge—digital academic fraud. 💻 🏫 🦹 Their integrated <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> platform combining <a href="https://infosec.exchange/tags/Graylog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Graylog</span></a> Security, AWS, and Obala AI now unifies observability, streamlines detection, and accelerates response time for critical institutions. 🙌 </p><p>ScaryByte delivers outcomes that matter, including:<br>🔍 Real-time threat detection<br>☑️ Faster forensics and compliance<br>🖥️ Expert-led deployments, scalable on AWS</p><p>Learn more about how ScaryByte is helping institutions restore trust in online learning.💡😃 See the full case study.👇 </p><p><a href="https://graylog.org/resources/customer-story-scarybyte/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/resources/customer</span><span class="invisible">-story-scarybyte/</span></a> <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/TDIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TDIR</span></a></p>
Graylog<p>It's time to tune in for the latest from <a href="https://infosec.exchange/tags/GraylogLabs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GraylogLabs</span></a>! 📺 🎊 Today we're taking about the new Caddy Webserver Content Pack. Say what? No, not <a href="https://infosec.exchange/tags/Caddyshack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Caddyshack</span></a>! ⛳ 🦫 Caddy Webserver! 🖥️ </p><p>This new content pack is going to help you quickly turn raw logs into structured, searchable insights. 🔎💡 🙌 It's available in Illuminate 6.4 and a Graylog Enterprise or Graylog <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> license, and delivers ready-to-use parsing rules, streams, and dashboards. 🚚 </p><p>Read up on:<br>❓ What this pack does<br>🪵 Getting logs into <a href="https://infosec.exchange/tags/Graylog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Graylog</span></a><br>🫵 Why you should log Caddy Webserver logs<br>🔍 How this helps you quickly detect anomalies, identify suspicious requests, and feed relevant data directly into your <a href="https://infosec.exchange/tags/TDIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TDIR</span></a> workflows</p><p><a href="https://graylog.org/post/caddy-webserver-data-in-graylog/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/post/caddy-webserv</span><span class="invisible">er-data-in-graylog/</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a></p>
Graylog<p>Reason #532 for why you should register NOW(!) for <a href="https://infosec.exchange/tags/GraylogGO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GraylogGO</span></a>... Seth Goldhammer will be delivering the highly anticipated annual roadmap keynote, "The Road Ahead: Graylog’s Vision for Innovation and <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a>". 🛣️ 🚗 </p><p>🗺️ Where is <a href="https://infosec.exchange/tags/Graylog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Graylog</span></a> headed next? <br>💡 What are the upcoming strategies, innovations, and enhancements that will help you stay ahead in today’s rapidly evolving threat landscape?<br>✨ What are the Graylog usability improvements that will empower your teams?<br>🤔 How does Graylog build “<a href="https://infosec.exchange/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a> without compromise?”</p><p>Find out! On Sept. 17th at 9AM ET—but only if you REGISTER (it's 🆓) — <a href="https://graylog.info/41iu8fv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">graylog.info/41iu8fv</span><span class="invisible"></span></a></p><p>Whether your an enterprise customer or an open source user, you’ll leave this session inspired and ready to take full advantage of what’s next.</p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
TechNadu<p>🚨 Exclusive Interview: Luigi Lenguito, CEO of BforeAI, details how attackers weaponize malicious domains — from fake portals &amp; disaster lures to AI-driven deception.</p><p>🧑‍💻 Read here 👉 <a href="https://www.technadu.com/from-registration-to-takedown-understanding-the-modern-malicious-domain-lifecycle-and-how-cybercriminals-exploit-real-world-events/606391/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/from-registration</span><span class="invisible">-to-takedown-understanding-the-modern-malicious-domain-lifecycle-and-how-cybercriminals-exploit-real-world-events/606391/</span></a></p><p>💬 Which phishing tactic do you think defenders underestimate most?<br> <br>Follow TechNadu for more expert insights.</p><p><a href="https://infosec.exchange/tags/MaliciousDomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaliciousDomains</span></a> <a href="https://infosec.exchange/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreat</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Interviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interviews</span></a> <a href="https://infosec.exchange/tags/AdversaryMapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdversaryMapping</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a></p>
LimaCharlie<p>Join us September 3rd for a virtual purple team workshop where you'll master Okta log integration and detection engineering on the LimaCharlie SecOps Cloud Platform.</p><p>What you'll build:</p><p>✓ Seamless Okta log ingestion pipelines<br>✓ Custom detections for suspicious logins, privilege escalation and MFA bypasses<br>✓ Validated detection rules using open-source adversary emulation tools<br>✓ Real-world purple team scenarios in your own dedicated lab environment</p><p>Ideal for security engineers, SOC analysts, and anyone serious about identity threat detection. You'll work hands-on in your own individual lab built with free and open-source tools in this live, unrecorded session.</p><p>Break free from vendor lock-in and build custom detection capabilities you actually need.</p><p>Register now: <a href="https://limacharlie.wistia.com/live/events/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=mastodon&amp;utm_medium=social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.wistia.com/live/ev</span><span class="invisible">ents/jwwf4pqdar?utm_campaign=virtual+workshop+9+2025&amp;utm_source=mastodon&amp;utm_medium=social</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>okta</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
The DefendOps Diaries<p>Traditional email defenses are getting a major upgrade. Discover how switching to an EDR mindset—focusing on detection and real-time response—is reshaping our fight against sophisticated cyber threats. Curious?</p><p><a href="https://thedefendopsdiaries.com/embracing-the-edr-mindset-in-email-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/embrac</span><span class="invisible">ing-the-edr-mindset-in-email-security/</span></a></p><p><a href="https://infosec.exchange/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a><br><a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>edr</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a><br><a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p>
The DefendOps Diaries<p>Okta just flipped the script on cybersecurity by open-sourcing its Auth0 Rules Catalog. Imagine a community-powered playbook that spots threats before they strike—ready to change the game? Check out how this could redefine defense.</p><p><a href="https://thedefendopsdiaries.com/oktas-open-source-initiative-empowering-cybersecurity-with-the-auth0-rules-catalog/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/oktas-</span><span class="invisible">open-source-initiative-empowering-cybersecurity-with-the-auth0-rules-catalog/</span></a></p><p><a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>okta</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a><br><a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a><br><a href="https://infosec.exchange/tags/auth0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>auth0</span></a></p>
Josh Lemon<p>🕵🏼‍♂️ Calling all Detection &amp; Response People! 🚨</p><p>Don't forget to contribute to the SANS Institute Detection &amp; Response Survey!&nbsp;</p><p>🔗 <a href="https://survey.sans.org/jfe/form/SV_afaP0wOMXHGLhDE" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">survey.sans.org/jfe/form/SV_af</span><span class="invisible">aP0wOMXHGLhDE</span></a></p><p>🗓️ It closes at the end of this week!</p><p>It would be great to get as much feedback from the community as possible. I'll be publishing the report towards the end of this year so everyone can benefit from the findings.</p><p><a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/CSIRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSIRT</span></a> <a href="https://infosec.exchange/tags/CERT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CERT</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SANSSurvey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SANSSurvey</span></a></p>
ECS Infotech Pvt. Ltd.<p>🔐 Insider threats often go unnoticed — until it’s too late.</p><p>From identifying risks to implementing complete solutions, insider threat detection tools are key to safeguarding your organization.</p><p>💡 Stay one step ahead of internal risks. Read more 👉 <a href="https://www.ecsinfotech.com/insider-threat-detection-tools-key-requirements-challenges-and-complete-solutions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ecsinfotech.com/insider-threat</span><span class="invisible">-detection-tools-key-requirements-challenges-and-complete-solutions/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InsiderThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InsiderThreat</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/CyberAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAwareness</span></a> <a href="https://infosec.exchange/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a> <a href="https://infosec.exchange/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a></p>
Graylog<p>🗣️ Let's talk about APTs (advanced persistent threats). 😬 An APT can gain access to your company’s systems and networks then hide within, and wait to complete objectives at a later time. ⏳👀 Since they can cause long-term damage to sensitive systems and data, understanding what they are and why they matter will enable you to better protect your org. 🛡️ </p><p>Read our latest blog to learn about:<br>🗝️ The key characteristics of APTs<br>⚔️ The 3 stages of an APT attack<br>🎯 The main motives and targets of an APT attack<br>🔍 How to detect an advanced persistent threat<br>👍 Best practices for mitigating, detecting, and responding to APTs</p><p><a href="https://graylog.org/post/advanced-persistent-threat-what-they-are-and-why-they-matter/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/post/advanced-pers</span><span class="invisible">istent-threat-what-they-are-and-why-they-matter/</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/TDIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TDIR</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p>
Claroty<p>Want to step up your CPS security? 📗 Download this Claroty eBook for practical strategies and real-world guidance across four solution areas: <a href="https://infosec.exchange/tags/ExposureManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExposureManagement</span></a>, <a href="https://infosec.exchange/tags/SecureAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureAccess</span></a>, <a href="https://infosec.exchange/tags/NetworkProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkProtection</span></a>, and <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a>. Choose from a chapter based on your greatest area of need to discover concrete ways to harness your newfound asset knowledge. <a href="https://claroty.com/resources/reports/the-cyber-physical-systems-security-playbook" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">claroty.com/resources/reports/</span><span class="invisible">the-cyber-physical-systems-security-playbook</span></a></p>
DataCenter360<p>Fortinet FortiGate 2025 Firewall Guide 🔐</p><p>Choosing the right firewall isn’t one-size-fits-all. We’ve compared five Fortinet FortiGate models—30G, 50G, 70G, 100F, and Rugged 70G-5G-DUAL—by performance, features, and best use cases.</p><p>From small office POS security to enterprise-scale SD-WAN to ruggedized IoT environments—there’s a FortiGate for every scenario.</p><p>📖 Read: <a href="https://datacenter360.ca/news/fortinet-firewall-comparison-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datacenter360.ca/news/fortinet</span><span class="invisible">-firewall-comparison-2025/</span></a> <br><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/Firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewalls</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🎯 NOW PUBLISHING: On-Location Coverage from Black Hat USA 2025!</p><p>We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!</p><p>🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!</p><p>We're proud to share this game-changing Brand Story conversation thanks to our friends at Stellar Cyber 🙏</p><p><a href="https://infosec.exchange/tags/StellarCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StellarCyber</span></a> Revolutionizes <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> Operations with Human-Augmented Autonomous Platform</p><p>Security operations centers are drowning in thousands of daily alerts while sophisticated threats demand immediate response. At Black Hat USA 2025, Subo Guha from Stellar Cyber shows how their revolutionary platform transforms this chaos into clarity.</p><p>Unlike traditional approaches that pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise. Their autonomous SOC concept dramatically reduces alert volume from hundreds of thousands to manageable numbers within days—not weeks.</p><p>Key innovations include: </p><p>• AI-driven auto-triage that identifies true positives among thousands of false alarms </p><p>• Natural language queries</p><p>• Advanced <a href="https://infosec.exchange/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> threat detection catching physical impossibilities like logins from Portland and Moscow 30 minutes apart </p><p>• Vendor-neutral architecture supporting CrowdStrike, SentinelOne, Sophos, and more</p><p>The result? </p><p><a href="https://infosec.exchange/tags/MSSPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSSPs</span></a> report dramatic efficiency gains, analysts focus on strategic decisions instead of alert fatigue, and organizations achieve faster threat detection with smaller, more focused teams.</p><p>📺 Watch the video: <a href="https://youtu.be/N3M1fxhMryM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/N3M1fxhMryM</span><span class="invisible"></span></a></p><p>🎧 Listen to the podcast: <a href="https://brand-stories-podcast.simplecast.com/episodes/stellar-cyber-revolutionizes-soc-cybersecurity-operations-with-human-augmented-autonomous-platform-at-black-hat-2025-a-stellar-cyber-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-subo-guha" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brand-stories-podcast.simpleca</span><span class="invisible">st.com/episodes/stellar-cyber-revolutionizes-soc-cybersecurity-operations-with-human-augmented-autonomous-platform-at-black-hat-2025-a-stellar-cyber-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-subo-guha</span></a></p><p>📖 Read the blog: <a href="https://www.itspmagazine.com/their-stories/stellar-cyber-revolutionizes-soc-cybersecurity-operations-with-human-augmented-autonomous-platform-at-black-hat-2025a-stellar-cyber-event-coverage-of-black-hat-usa-2025-las-vegas" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/stellar-cyber-revolutionizes-soc-cybersecurity-operations-with-human-augmented-autonomous-platform-at-black-hat-2025a-stellar-cyber-event-coverage-of-black-hat-usa-2025-las-vegas</span></a></p><p>➤ Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itspm.ag/stellar-cyber--inc--3</span><span class="invisible">57947</span></a> </p><p>✦ Catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/ste</span><span class="invisible">llarcyber</span></a> </p><p>🎪 Follow all of our <a href="https://infosec.exchange/tags/BHUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA</span></a> 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> <a href="https://infosec.exchange/tags/SecurityOperations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityOperations</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> <a href="https://infosec.exchange/tags/BHUSA25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA25</span></a> <a href="https://infosec.exchange/tags/IdentitySecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentitySecurity</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/AlertFatigue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlertFatigue</span></a> <a href="https://infosec.exchange/tags/agenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>agenticAI</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecuity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecuity</span></a></p>
Tedi Heriyanto<p>The double-edged sword of MCP: Understanding the threat landscape for AI workflows: <a href="https://redcanary.com/blog/threat-detection/mcp-ai-workflows/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redcanary.com/blog/threat-dete</span><span class="invisible">ction/mcp-ai-workflows/</span></a></p><p><a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a></p>
Jacky Kapadia<p>Project Ire: Microsoft’s AI Sentinel Against Malware.</p><p><a href="https://flipboard.social/tags/ProjectIre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectIre</span></a>, <a href="https://flipboard.social/tags/MicrosoftAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftAI</span></a>, <a href="https://flipboard.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a>, <a href="https://flipboard.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a>, <a href="https://flipboard.social/tags/MalwareProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareProtection</span></a>, <a href="https://flipboard.social/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a>, <a href="https://flipboard.social/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a>, <a href="https://flipboard.social/tags/AIinCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIinCybersecurity</span></a>, <a href="https://flipboard.social/tags/ZeroDayThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDayThreats</span></a>, <a href="https://flipboard.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p><p><a href="https://medium.com/@jckapadia003/project-ire-microsofts-ai-sentinel-against-malware-664772d099d1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@jckapadia003/proje</span><span class="invisible">ct-ire-microsofts-ai-sentinel-against-malware-664772d099d1</span></a></p>