Cyber Defense Magazine details how investigators used GPT models to scan dark web forums, achieving 96% accuracy in extracting stolen credential signals. The article weighs scalability in SOCs and emp…
Category: Industry News / Research & Tools / Research & Tools
#dark-web#llm#cti#threat-intel
BlockThreat’s Week 43 newsletter reports a relatively quiet week (<$1M losses) and covers research on price oracle exploits, off-chain and multisig security, and tooling updates across Ethereum and So…
Category: Industry News / Research & Tools / Research & Tools
#defi#oracle#multisig#crypto
The referenced page is blocked by Cloudflare protection and could not be accessed for full details. The headline suggests research into a prompt-injection vector via a browser address bar for ChatGPT …
Category: Industry News / Research & Tools / Research & Tools
#prompt-injection#ai-security#cloudflare-blocked
CrowdStrike’s State of Ransomware survey highlights a widening confidence gap: while half of 1,100 leaders believe they’re “very well prepared,” 78% were attacked in the last year and only 22% restore…
Category: Industry News / Research & Tools / Research & Tools
#ransomware#survey#ai#downtime#preparedness
Compass Security released bRPC‑Web, a Burp Suite extension that decodes and edits gRPC‑Web payloads, enabling analysts to intercept binary Protobuf messages and iteratively test API behaviors. The too…
Category: Industry News / Research & Tools / Research & Tools
#grpc#burp#protobuf#pentest
TrustedSec details a practical detection pattern for Entra ID password spraying using a decoy/honeypot account. The method leverages sign‑in error codes and IP telemetry to distinguish real user mista…
Category: Industry News / Research & Tools / Research & Tools
#entra-id#password-spray#honeypot#identity
Google launched a preview of agentic threat intelligence, a conversational interface that orchestrates specialized agents for CTI and malware analysis, correlating OSINT, Mandiant, VirusTotal, and dar…
Category: Industry News / Research & Tools / Research & Tools
#ai#threat-intel#mandiant#virustotal
MITRE signaled that ATT&CK v18 will deprecate the Defense Evasion tactic, splitting it into Stealth and Impair Defenses. The overhaul will re‑categorize techniques, refine others (e.g., Process Inject…
Category: Industry News / Research & Tools / Research & Tools
#mitre-attck#v18#taxonomy#defense-evasion
Cybersecurity Ventures spotlights the shift from reactive SOCs to augmented, AI‑enabled operations that emphasize playbook design, detection logic, and continuous model training. Automation elevates a…
Category: Industry News / Research & Tools / Research & Tools
#soc#automation#ai#operations
Microsoft details attack paths abusing Azure Blob Storage across the kill chain—from reconnaissance and misconfigured SAS tokens to lateral movement via blob‑triggered Functions and data exfiltration …
Category: Industry News / Research & Tools / Research & Tools
#azure#blob-storage#mitre#sas#defender-for-storage
Microsoft’s Digital Defense Report highlights the dominance of financially motivated threats, with over half of investigated incidents tied to extortion/ransomware and a surge in identity attacks driv…
Category: Industry News / Research & Tools / Research & Tools
#microsoft#digital-defense-report#ransomware#phishing#identity
Permanent injunction prohibits NSO Group from targeting WhatsApp users; damages reduced to ~$4M. Source: TechCrunch.
Category: Industry News / Research & Tools / Research & Tools
#nso_group#whatsapp#meta#legal
CrowdStrike outlines ExPRT.AI, an AI-driven model that predicts vulnerabilities most likely to be exploited. Source: CrowdStrike.
Category: Industry News / Research & Tools / Research & Tools
#crowdstrike#exprtai#vulnerability_management
University of Missouri researchers report a 97%-accurate AI-driven framework to detect and explain hardware trojans in chip designs, outlined in an IEEE Access publication. The system—leveraging large…
Category: Industry News / Research & Tools / Research & Tools
#hardware-security#supply-chain#ai#explainable-ai#semiconductors
Experts from OT-ISAC, CI-ISAC, FDD, and SANS outline why ICS awareness must prioritize safety, physics-level risks, and tailored training to counter nation-state threats like Volt Typhoon.
Category: Industry News / Research & Tools / Research & Tools
#ICS#OT security#threat intelligence#training#nation-state
Daily ISC Stormcast episode highlights notable security items for Oct 13, 2025; enterprises should review for patching and emerging TTPs.
Category: Industry News / Research & Tools / Research & Tools
#SANS#ISC#podcast#daily-brief#patching
Researchers propose UNIZKs under the LWE assumption and outline a passive steganography detection mechanism for arbitrary functionalities—broadening practical zero-knowledge applications beyond iO-bas…
Category: Industry News / Research & Tools / Research & Tools
#cryptography#NIZK#LWE#steganography#research