Innovate Cybersecurity
336 posts
Weekly Top 10: 05.26.2025: Botnets Disrupted Worldwide… Operation Endgame Is Back; Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks; M&S’ $400 Million Cyberattack Upheaval to Linger Into July; and More.
Botnets Disrupted Worldwide... Operation Endgame Is Back; Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks; M&S’ $400 Million Cyberattack Upheaval to Linger Into July
May 26, 2025 16:00 GMT
Weekly Top 10: 05.19.2025: Two 0-Day Exploits in Ivanti Endpoint Management Used in the Wild; Windows 10 Updates Cause Bootlocker Encryption; AI Vishing Campaign Impersonates Government Officials; and More.
Two 0-Day Exploits in Ivanti Endpoint Management Used in the Wild; Windows 10 Updates Cause Bootlocker Encryption; AI Vishing Campaign Impersonates Government Officials; and 7 More.
May 19, 2025 16:00 GMT
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams scrambling at all hours, scouring runbooks or playbooks to figure out the next steps during an attack. Automation can simplify much of this work, according to Abby Dykes, Threat Operations & Forensics Team Lead at Novacoast, who walked us through a few IR scenarios at the Nashville Innovate Summit in April.
May 18, 2025 18:20 GMT
Weekly Top 10: 05.12.2025: Critical Code Execution Flaw Patched in LangFlow; CISA Warns Threat Actors are Targeting Energy and Transportation Systems Sectors, Google Patches Zero-Click RCE Flaw on Android, and More.
Critical Code Execution Flaw Patched in LangFlow; CISA Warns Threat Actors are Targeting Energy and Transportation Systems Sectors, Google Patches Zero-Click RCE Flaw on Android
May 12, 2025 16:00 GMT
Weekly Top 10: 05.05.2025: Using Trusted Protocols Against You: Gmail as a C2 Mechanism, Shadow Roles: AWS Defaults Can Open the Door to Service Takeover, Gremlin Stealer: New Stealer on Sale in Underground Forum, and More.
Using Trusted Protocols Against You: Gmail as a C2 Mechanism, Shadow Roles: AWS Defaults Can Open the Door to Service Takeover, Gremlin Stealer: New Stealer on Sale in Underground Forum, and 7 More.
May 5, 2025 16:00 GMT
The Growing Use of AI and LLMs (Part 2)
In this next part of this conversation on large language model (LLM), AI, and Machine Learning (ML), Eron Howard, Novacoast's Chief Operating Officer, and Carlos Bello, an Analyst and Developer at Novacoast, discuss prompt engineering, robotics, security, and how these tools enhance businesses' cybersecurity hygiene.
May 1, 2025 06:23 GMT
Concentric AI Honored with “Most Innovative Technology” Award at 2025 Innovate Cybersecurity Summit in Nashville
NASHVILLE, TENNESSEE — The 2025 Innovate Cybersecurity Summit proudly named Concentric AI the winner of its prestigious “Most…
April 28, 2025 21:55 GMT
Weekly Top 10: 04.21.2025: ASUS AiCloud Authentication Bypass, CISA Warns of SonicWall SMA Being Actively Exploited, ‘Mustang Panda’ Employs Four New Attack Tools, and More.
ASUS AiCloud Authentication Bypass, CISA Warns of SonicWall SMA Being Actively Exploited, 'Mustang Panda' Employs Four New Attack Tools, and 7 More.
April 21, 2025 16:00 GMT
Weekly Top 10: 04.14.2025: Exploitation of CLFS Zero-Day Leads to Ransomware Activity, Unraveling the U.S. Toll Road Smishing Scams, Shuckworm Targets Foreign Military Mission Based in Ukraine, and More.
Exploitation of CLFS Zero-Day Leads to Ransomware Activity, Unraveling the U.S. Toll Road Smishing Scams, Shuckworm Targets Foreign Military Mission Based in Ukraine, and 7 More.
April 14, 2025 16:00 GMT
The Growing Use of AI and LLMs (Part 1)
Large Language Models (LLMs) and Machine Learning (ML) have emerged as powerful tools enabling advanced threat detection methods. Recently, Eron Howard and Carlos Bello met to discuss AI and LLMs. This article is part one of their conversation.
April 8, 2025 18:25 GMT