Innovate Cybersecurity
345 posts
The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for recruiting a spy, and just how easy it can be to weaponize a human asset in 2025.
July 1, 2025 11:35 GMT
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a spy thriller—more activity is being attributed not just to remote nation-state actors, but human assets recruited to penetrate the office perimeter in-person with the goal of exfiltrating data.
July 1, 2025 11:34 GMT
Weekly Top 10: 06.30.2025: Cybercrime Surging Across Africa; New Exploits Target CitrixBleed-2 Vulnerability; Microsoft 365 Abuse Enables Phishing from Trusted Sources, and More.
Cybercrime Surging Across Africa; New Exploits Target CitrixBleed-2 Vulnerability; Microsoft 365 Abuse Enables Phishing from Trusted Sources, and 7 more.
June 30, 2025 16:00 GMT
What is FIN6? And Why Its Latest Malware Attack Is So Effective
Looking for a new job or employee has become a more perilous task thanks to the recent tactics to spread malware by FIN6.
Here we take a look at some of what makes FIN6 More_eggs attacks work so well.
June 24, 2025 15:54 GMT
Weekly Top 10: 06.23.2025: Initial Access Broker of Ransomware Group Ryuk Extradited to the U.S.; Cloudflare Blocked a Record 7.3 Tbps DDoS Attack; Record 16 Billion Credentials Leaked on Hacking Forum, and More.
Initial Access Broker of Ransomware Group Ryuk Extradited to the U.S.; Cloudflare Blocked a Record 7.3 Tbps DDoS Attack; Record 16 Billion Credentials Leaked on Hacking Forum, and 7 more.
June 23, 2025 16:00 GMT
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams scrambling at all hours, scouring runbooks to figure out the next steps during an attack. Automation can simplify much of this work, according to Abby Dykes, Threat Operations & Forensics Team Lead at Novacoast, who walked us through a few IR scenarios at the Nashville Innovate Summit in April.
June 18, 2025 16:30 GMT
Weekly Top 10: 06.16.2025: Fog Ransomware: Unusual Toolset Used in Recent Attack; EchoLeak: Critical Zero-Click AI Vulnerability in Microsoft 365 Copilot; Stealth Falcon’s Exploit of Microsoft Zero-Day Vulnerability, and More.
Fog Ransomware: Unusual Toolset Used in Recent Attack; EchoLeak: Critical Zero-Click AI Vulnerability in Microsoft 365 Copilot; Stealth Falcon's Exploit of Microsoft Zero-Day Vulnerability, and 7 more.
June 16, 2025 16:00 GMT
The Growing Use of AI and LLMs (Part 1)
Large Language Models (LLMs) and Machine Learning (ML) have emerged as powerful tools enabling advanced threat detection methods. Recently, Eron Howard and Carlos Bello met to discuss AI and LLMs. This article is part one of their conversation.
June 10, 2025 20:02 GMT
The Growing Use of AI and LLMs (Part 2)
In this next part of this conversation on large language model (LLM), AI, and Machine Learning (ML), Eron Howard, Novacoast's Chief Operating Officer, and Carlos Bello, an Analyst and Developer at Novacoast, discuss prompt engineering, robotics, security, and how these tools enhance businesses' cybersecurity hygiene.
June 10, 2025 20:01 GMT
Weekly Top 10: 06.09.2025: PathWiper Malware Targets Ukrainian Infrastructure; Zero-Click iMessage Exploit Used Against EU and U.S. Officials; Fake AI Tools Used to Distribute Ransomware and More.
PathWiper Malware Targets Ukrainian Infrastructure; Zero-Click iMessage Exploit Used Against EU and U.S. Officials; Fake AI Tools Used to Distribute Ransomware and 7 More.
June 9, 2025 16:00 GMT