The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for…
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a…
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams…
The Growing Use of AI and LLMs (Part 1)
Large Language Models (LLMs) and Machine Learning (ML) have emerged as powerful tools…
The Growing Use of AI and LLMs (Part 2)
In this next part of this conversation on large language model (LLM), AI, and Machine…
OpenAI Case Study On Disrupting Malicious Use Of AI
OpenAI has released a comprehensive statement complete with case studies titled…
Concentric AI Honored with “Most Innovative Technology” Award at 2025 Innovate Cybersecurity Summit in Nashville
NASHVILLE, TENNESSEE — The 2025 Innovate Cybersecurity Summit proudly named Concentric AI…
AI-Written Malware – An Emerging Cybersecurity Threat
The new dawn of AI-assisted coding has yielded a major advantage for cyberattackers. The…
The Dangerous Divide: Silos Between Security and IT Operations
The gap between security teams and IT operations has been a persistent issue in enterprises,…
FunkSec: Emergent AI-Coded Ransomware on the Rise
This new emergent ransomware group has analysts deeply concerned. It appeared in late 2024…
How Cybersecurity Vulnerabilities Are Impacting Public Utilities
US public utilities experienced a 70% increase in cyberattacks this year, according to…
RAT Roundup: How This Year’s More Interesting Trojans Could Affect You
Remote Access Trojans have existed and evolved since the dawn of malware, with 2024 being no…