InDark Roast SecuritybyKatlyn GalloGetting Started with Cyber Threat IntelligenceQuick & Easy Strategies to Maximize Your Cyber Defense Program with CTIApr 8, 2023Apr 8, 2023
InDark Roast SecuritybyKatlyn GalloPreparing for Killnet’s DDoS Attacks: What Healthcare Organizations Need to KnowDark Roast Intelligence BriefingFeb 8, 2023Feb 8, 2023
InDark Roast SecuritybyKatlyn GalloAlbum Stealer Malware, RMM Software Attacks & Vulnerability Exploits Trending in the WildDark Roast Intelligence | February 1, 2023Feb 1, 2023Feb 1, 2023
InDark Roast SecuritybyKatlyn GalloFormbook Malware, shaderz Python Package & Two Major Zero-DaysDark Roast Intelligence | December 18, 2022Dec 18, 2022Dec 18, 2022
InDark Roast SecuritybyKatlyn GalloCyberattack Against DraftKings, the Delivery of Qbot & a Google Chrome Zero-DayDark Roast Intelligence | November 28, 2022Nov 28, 2022Nov 28, 2022
InDark Roast SecuritybyKatlyn GalloAmazon RDS Data Exposure, Breach of a Federal Network & the Rise of DTrack MalwareDark Roast Intelligence | November 21, 2022Nov 21, 2022Nov 21, 2022
InDark Roast SecuritybyKatlyn GalloIntroducing Dark Roast IntelligenceThe newest section of Dark Roast Security.Nov 15, 2022Nov 15, 2022
InDark Roast SecuritybyKatlyn GalloThere’s a New PhaaS Platform in Town: CaffeineAn overview of the latest Phishing-as-a-Service platform and how it differs from others.Oct 24, 2022Oct 24, 2022
InDark Roast SecuritybyKatlyn GalloWhat You Should Know About the Colonial Pipelines CyberattackWhat happened at Colonial Pipelines?May 14, 20215May 14, 20215
InDark Roast SecuritybyKatlyn GalloThe Russia-Ukraine CrisisDark Roast Intelligence BriefingFeb 28, 2022Feb 28, 2022
InDark Roast SecuritybyKatlyn GalloThe Latest on Russia-Ukraine Cyber ThreatsDark Roast Intelligence BriefingApr 15, 2022Apr 15, 2022
InDark Roast SecuritybyKatlyn GalloLevel Up Your Cybersecurity Operations With Threat-Informed DefenseWhat is threat-informed defense & how can I adopt it in my organization?Jul 15, 20221Jul 15, 20221
InDark Roast SecuritybyKatlyn GalloIntegrating Threat Intelligence & ATT&CK Into a Security ProgramHow can companies use threat intelligence and the ATT&CK framework to make their security programs more effective?Jul 19, 2022Jul 19, 2022