Summary: Bart is an experienced Senior Product Marketing Manager specializing in security operations solutions, with a career spanning over two decades. His background includes pivotal roles in product management and marketing for notable companies like McAfee, FireEye-Mandiant, and CrowdStrike, focusing on Threat Intelligence. Currently at Infoblox, he leverages his expertise to communicate research and thought leadership related to DNS-sourced threat intelligence.…
Read More
41% of Attacks Bypass Defenses: Adversarial Exposure Validation Fixes That
Summary: Many organizations face significant security gaps, with 41% of attacks bypassing existing defenses despite the use of various security tools. Traditional testing methods are often insufficient for validating security effectiveness, leading to a false sense of security. Adversarial Exposure Validation (AEV) integrates Breach and Attack Simulation (BAS) and Automated Penetration Testing (APT) to provide continuous and real-world testing that enhances security posture and resilience against cyber threats.…
Read More
Understanding and Threat Hunting for RMM Software Misuse
Threat actors are increasingly exploiting Remote Monitoring and Management (RMM) software to conduct sophisticated cyberattacks, using tools like AnyDesk, Atera Agent, and MeshAgent for unauthorized access, data exfiltration, and persistence in compromised networks. This trend highlights the potential risks posed by these tools, which are often embedded in organizational IT workflows.…
Read More
CVE-2025-21299: Unguarding Microsoft Credential Guard
A newly discovered vulnerability, CVE-2025-21299, allows an attacker to bypass Credential Guard in Windows by exploiting improper validation in Kerberos TGTs. The issue was partially mitigated in the January 2025 Patch Tuesday but was completely addressed in April 2025 with the release of CVE-2025-29809. This vulnerability could potentially lead to unauthorized access to primary credentials.…
Read More
Enhancing your DevSecOps with Wazuh, the open source XDR platform
Summary: DevSecOps integrates security into every stage of software development, promoting shared responsibility among teams to enhance resilience and reduce vulnerabilities. By employing solutions like Wazuh, organizations can monitor and protect their CI/CD pipelines, ensuring early detection and remediation of security threats. Wazuh’s capabilities further streamline compliance management and provide real-time security insights across infrastructure and applications.…
Read More
What They Didn’t Secure: SaaS Security Lessons from the World’s Biggest Breaches
This guide outlines a strategic security approach for Software-as-a-Service (SaaS) applications, focusing on five key pillars: Identity and Access Management (IAM), Data Protection, Secure Development, Network Security Controls, and Incident Response & Monitoring. It emphasizes the need for adopting Zero Trust principles and aligns each security pillar with established industry standards.…
Read More
BlackTech Unmasked
The article examines the sophisticated cyber espionage group known as BlackTech, believed to be state-sponsored by the People’s Republic of China. Since at least 2010, they have targeted critical sectors across East Asia and the US, employing advanced tactics, techniques, and procedures (TTPs) to infiltrate networks and steal valuable information.…
Read More

Courses to become a “Zero to Hero” in Cyber ​​Security without marketing , you will have to:

study a lot (we are talking about a “Hero” right?)study “non-technical” and “unconventional” things (Quality = Hard Skills + Soft Skills)study the same thing more than once (Learn = Repeat + Repeat + Repeat)

Good point:

The only investment is your time, everything is “on the line”, “free”, “no cost”.…
Read More
Silent Intruders – PrintNightmare – Remote Code Execution (RCE) vulnerabilities in Windows systems
The PrintNightmare incident illustrates the grave risks associated with Remote Code Execution (RCE) vulnerabilities in Windows systems. These vulnerabilities allow attackers to execute arbitrary code, leading to severe data breaches and system compromises without requiring physical access. This article discusses how RCE exploits work, presents various real-world case studies, and shares strategies for protecting Windows environments from such threats.…
Read More
⚡ Weekly Recap: VPN Exploits, Oracle’s Silent Breach, ClickFix Surge and More
Summary: The cybersecurity landscape is plagued by persistent threats stemming from unpatched systems, oversights, and social engineering tactics that facilitate breaches. This report highlights significant vulnerabilities and recent breaches linked to well-known organizations and emerging threat actors. The trends illustrate a critical need for companies to prioritize security measures against increasingly sophisticated attacks.…
Read More
NEPTUNE RAT : An advanced Windows RAT with System Destruction Capabilities and Password Exfiltration from 270+ Applications
The latest Neptune RAT variant poses a significant threat, utilizing PowerShell commands to deliver and execute malicious payloads via an obfuscated script. It features advanced techniques for persistence and anti-analysis, enabling it to steal credentials, perform live monitoring, and execute ransomware capabilities. The report discusses its distribution methods across platforms like GitHub and highlights the dangers it poses to users.…
Read More
CISA, FBI, nations warn of fast flux DNS threat
Summary: The US Cybersecurity Infrastructure Agency (CISA) has issued a warning to organizations and cybersecurity firms regarding the rising threat of fast flux attacks, which malicious actors use to obscure the location of their servers by frequently changing DNS records. Fast flux tactics, often involving botnets, complicate efforts to block malicious infrastructure, posing significant national security risks.…
Read More
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
OUTLAW is a persistent, auto-propagating coinminer that utilizes simple techniques such as SSH brute-forcing and modification of commodity miners for infection and persistence. By deploying a honeypot, researchers gained insights into how OUTLAW operates, revealing the malware’s ability to maintain control and expand its botnet with basic tactics.…
Read More
This advisory addresses the significant threat posed by the “fast flux” technique, used by malicious cyber actors to evade detection and maintain command and control infrastructure. Fast flux enables the rapid alteration of DNS records, complicating tracking and blocking actions. The advisory calls for collaborative efforts from government entities and service providers to enhance detection and mitigation capabilities against fast flux activities.…
Read More
AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock
Summary: The content discusses the barriers to AI adoption in enterprises, particularly the security, legal, and compliance challenges that stall innovation. It explores the importance of effective AI governance and collaboration among security, compliance, and technical teams to facilitate AI implementation. Practical strategies and insights from industry leaders are provided to bridge the gap between AI innovation and governance challenges.…
Read More
From Espionage to PsyOps: Tracking Operations and Bulletproof Providers of UACs in 2025
This report details the activities of Russia-aligned intrusion sets UAC-0050 and UAC-0006, which have been engaged in financially and espionage-motivated spam campaigns targeting various entities globally, particularly in Ukraine. They employ psychological operations, utilize malware for financial theft, and rely on bulletproof hosting providers to obfuscate their infrastructure.…
Read More
Detecting Obfuscated PowerShell Attacks Using Sysmon and the ELK Stack
This article describes a lab project focused on detecting obfuscated PowerShell attacks using Sysmon, Winlogbeat, and the ELK stack. It highlights the challenges presented by attackers utilizing PowerShell and command-line obfuscation, aiming to provide defenders with hands-on experience in threat detection. The lab teaches students to recognize malicious activities, log telemetry, and utilize practical tools for cybersecurity defenses.…
Read More