our blog
Featured Post

Red Team Tools
Threat Synopsis – Red Team Tools Over the years Threat Actors have steadily adopted the use of red team tools (sometimes referred to as offensive

Red Team Tools
Threat Synopsis – Red Team Tools Over the years Threat Actors have steadily adopted the use of red team tools (sometimes referred to as offensive

Proactive Security and Why Every Business Needs It… Yesterday
Threat hunting isn’t important for companies, it’s an imperative. I can say that with confidence as a practitioner who has worked in security analysis, threat

Cyborg Security featured on Cybernews!
Probably the best motivation for us is community feedback – especially when that feedback is positive! It validates our mission and helps give us great

MSPs Have Unique Advantages in Threat Hunting – Strength in Numbers
Implementing robust security strategies can help mitigate the risk of cyber threats, especially in the early stages of an attack. However, implementing a “robust security

How to Prevent Ransomware: 5 Common Behaviors to Hunt
Ransomware continues to plague organizations and governments worldwide. In fact, in just the last few weeks, several major federal, state and local governments have been

6 Threat Hunting Ideas You Can Use Today!
Threat hunting is often referred to as a semi-scientific practice. This is because hunters will deploy hunts based on a hypothesis, collect evidence, and document

Threat Hunting Hypothesis Examples: Five Hunts to Start Out
Introduction Structured threat hunting (often referred to as hypothesis-based hunting) remains one of the best ways that organizations can find previously undetected threats in their