Tag: threat intelligence

  • Cisco Talos Blog: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect

    Source URL: https://blog.talosintelligence.com/cisco-talos-at-black-hat-2025-briefings-booth-talks-and-what-to-expect/ Source: Cisco Talos Blog Title: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect Feedly Summary: Cisco Talos is back at Black Hat with new research, threat detection overviews and opportunities to connect with our team. Whether you’re interested in what we’re seeing in the threat landscape, detection…

  • Unit 42: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks

    Source URL: https://unit42.paloaltonetworks.com/infiltration-of-global-telecom-networks/ Source: Unit 42 Title: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks Feedly Summary: Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. The post The Covert Operator’s Playbook: Infiltration of Global Telecom…

  • Cloud Blog: Too many threats, too much data, say security and IT leaders. Here’s how to fix that

    Source URL: https://cloud.google.com/blog/products/identity-security/too-many-threats-too-much-data-new-survey-heres-how-to-fix-that/ Source: Cloud Blog Title: Too many threats, too much data, say security and IT leaders. Here’s how to fix that Feedly Summary: An overwhelming volume of threats and data combined with the shortage of skilled threat analysts has left many security and IT leaders believing that their organizations are vulnerable to cyberattacks…

  • Cloud Blog: Your guide to Google Cloud Security at Black Hat USA 2025

    Source URL: https://cloud.google.com/blog/products/identity-security/your-guide-to-google-cloud-security-at-black-hat-usa-2025/ Source: Cloud Blog Title: Your guide to Google Cloud Security at Black Hat USA 2025 Feedly Summary: At Google Cloud Security, our mission is to empower organizations to strengthen their defenses with innovative security capabilities, all while simplifying and modernizing their cybersecurity. In a world of evolving threats and increasing complexity, we…

  • Microsoft Security Blog: Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/07/22/microsoft-sentinel-data-lake-unify-signals-cut-costs-and-power-agentic-ai/ Source: Microsoft Security Blog Title: Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI Feedly Summary: We’re evolving our industry-leading Security Incidents and Event Management solution (SIEM), Microsoft Sentinel, to include a modern, cost-effective data lake. By unifying all your security data, Microsoft Sentinel data lake, in public preview,…

  • Unit 42: Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief

    Source URL: https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/ Source: Unit 42 Title: Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief Feedly Summary: Unit 42 has observed an active exploitation of recent Microsoft SharePoint Vulnerabilities. Here’s how you can protect your organization. The post Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief appeared first on Unit 42. AI Summary and Description:…