Meet Emma…HR Disruptor and Club member!
As VP of HR, Emma Denning leads a team that balances strategy with agility, ensuring a globally dispersed, remote workforce stays connected, engaged, and empowered. From replacing policies with light touch principles to championing trust and accountability, Emma is helping shape an HR function that truly supports both people and performance. In this spotlight, Emma shares her insights on what it takes to build an agile, people-first HR function that truly makes a difference.
Managing a cyber crisis
Cyber incidents pose not only technical challenges but communications challenges. Tom Bolitho of FTI Consulting shares guidance on successful strategies to manage complex stakeholder demands and minimize reputational damage.
Threat Hunting: Inmersión en Malware
Descubre cómo potenciar tu programa de CTI y mejorar tus defensas partiendo desde IOCs a implementar threat-hunting basado en comportamiento. Únete a Jorge Rodríguez, director de malware research en Intel 471 en nuestro siguiente webinar el 30 de abril.
RSA Conference 2025 Announcements Summary (Day 1)
Intel 471 announced enhancements to its HUNTER platform, including Bring Your Own Hunts, a feature that allows threat hunters to map hunt queries to tried-and-tested methodology for managing investigations and measuring hunt performance metrics, and Guided Threat Hunts, which helps security teams hunt advanced adversary behaviors with greater speed, decisiveness and consistency.
LabHost: A defunct but potent phishing service
The administrator of LabHost, a phishing-as-a-service (PhaaS) offering, was sentenced to 8 1/2 years in prison. Here's why PhaaS services are making it more difficult for defenders to prevent account takeovers and fraud.
Threat Hunting Workshop 15: Hunting for Execution - Level 2
Sharpen your ability to detect malicious execution activity through hands-on threat hunting and intelligence-led analysis.
Understanding and threat hunting for RMM software misuse
Remote monitoring and management software is useful for administrators and threat actors, who often abuse or install it. Here's a briefing on RMM platform misuse and guidance for how to threat hunt for misbehavior.
Threat-hunting case study: Windows Management Instrumentation abuse
Attackers often use Windows Management Instrumentation (WMI) for reconnaissance to map networks. This case study describes how to threat hunt for malicious use of WMI, which is also used legitimately by administrators.
AI Powered Phishing Kits: The New Frontier in Social Engineering
Over the past few weeks, security researchers from Intel 471 and Proofpoint have uncovered a disturbing trend: AI-powered phishing kits are now being sold openly on Telegram, many of them boasting integrations with ChatGPT-style language models and LinkedIn scraping capabilities.
2025 SC Awards Finalists: Innovator (Executive or Practitioner) of the Year
Cybersecurity innovation depends heavily on visionary leadership and technical excellence. This year's finalists are notable for pushing boundaries, adopting unconventional approaches, and significantly enhancing cybersecurity practices.