Signal Messenger: APT28/Fancy Bear’s Latest Attack Vector
Recently, Signal Messenger has been in the news for several reasons. A prolific threat group…
Web of Influence: How Scattered Spider Is Intensifying Its Attacks
With attack sectors ranging from hospitality to finance and telecommunications, Scattered…
The Necessity of Real-Time AI Playbook Updates
Threat teams are staying on high alert because AI-powered threat campaigns are becoming more…
Strengthening Identity Proofing in the Age of AI Voice Generators
In the age of artificial intelligence, identity and trust are critical. But businesses must…
The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for…
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a…
What is FIN6? And Why Its Latest Malware Attack Is So Effective
Looking for a new job or employee has become a more perilous task thanks to the recent…
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams…
The Growing Use of AI and LLMs (Part 1)
Large Language Models (LLMs) and Machine Learning (ML) have emerged as powerful tools…
The Growing Use of AI and LLMs (Part 2)
In this next part of this conversation on large language model (LLM), AI, and Machine…
OpenAI Case Study On Disrupting Malicious Use Of AI
OpenAI has released a comprehensive statement complete with case studies titled…
Concentric AI Honored with “Most Innovative Technology” Award at 2025 Innovate Cybersecurity Summit in Nashville
NASHVILLE, TENNESSEE — The 2025 Innovate Cybersecurity Summit proudly named Concentric AI…