#threat-hunting

[ follow ]
Information security
fromTechzine Global
17 hours ago

Cisco launches agentic security tools for autonomous AI security

Cisco Foundation AI adds agentic security tools—Foundation-sec-8B-Reasoning, Adaptive AI Search Framework, and PEAK—to enable transparent, human-controllable autonomous threat analysis.
fromSecurityWeek
4 days ago

Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

Threat hunting is in flux. What started as a largely reactive skill became proactive and is progressing toward automation. Threat hunting is the practice of finding threats within the system. It sits between external attack surface management (EASM), and the security operations center (SOC). EASM seeks to thwart attacks by protecting the interface between the network and the internet. If it fails, and an attacker gets into the system, threat hunting seeks to find and monitor the traces left by the adversary so the attack can be neutralized before damage can be done. SOC engineers take new threat hunter data and build new detection rules for the SIEM.
Science
Information security
fromIT Pro
1 month ago

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

Cyber deception tools like honeypots can boost visibility, detect novel threats, and disrupt attackers but require clear strategy, outcome-based metrics, and standardized terminology.
Information security
fromSecuritymagazine
2 months ago

Bringing AI to The SOC Is Not Intended to Replace Humans

AI-powered SOCs must use a consolidated context lake and multi-agent architecture to enable autonomous reasoning, continuous learning, and coordinated SecOps at scale.
fromThe Hacker News
3 months ago

Moving Beyond Awareness: How Threat Hunting Builds Readiness

Make no mistake, as a security professional, I love this month. Launched by CISA and the National Cybersecurity Alliance back in 2004, it's designed to make security a shared responsibility. It helps regular citizens, businesses, and public agencies build safer digital habits. And it works. It draws attention to risk in its many forms, sparks conversations that otherwise might not happen, and helps employees recognize their personal stake in and influence over the organization's security.
Information security
Cryptocurrency
fromThe Hacker News
6 months ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
#cybersecurity
Privacy professionals
fromNextgov.com
9 months ago

CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in

CISA is discontinuing key cybersecurity tools as part of ongoing budget cuts, potentially impacting its threat-hunting capabilities.
[ Load more ]