UA Little Rock Hires Expert Digital Forensic Examiner as New Cybersecurity Professor University of Arkansas at Little Rock
cyberintel.kalymoon.com · 430 articles · updated every 4 hours · grows forever
UA Little Rock Hires Expert Digital Forensic Examiner as New Cybersecurity Professor University of Arkansas at Little Rock
Google named a Leader in the Cybersecurity Incident Response Services Forrester Wave report Google Cloud
Announcing The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024 Forrester
Unit 42 — A Leader in The Forrester Wave for Cybersecurity Incident Response Palo Alto Networks
Effective Incident Response: A Cybersecurity Playbook for Executives OX Security
NIST releases SP 800-61r3 draft on cybersecurity incident response recommendations for public comment Industrial Cyber
Center for Cybersecurity fosters digital forensics training opportunity for law enforcement Purdue University Northwest
Incident Response | CSRC | CSRC NIST Computer Security Resource Center | CSRC (.gov)
2024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat Tactics Unit 42
GAO audit reveals federal agencies' struggle to fully implement cybersecurity incident response requirements Industrial Cyber
HHS Stresses Importance of Having an Effective Cybersecurity Incident Response Plan The HIPAA Journal
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 Google has released an emergency update to Chrome patching two actively exploited high-severity zero-days discovered by it…
Medtech Giant Stryker Offline After Iran-Linked Wiper Malware Attack Fortune 500 medical technology company Stryker — manufacturer of surgical and neurotechnology equipment with over 53,000 employees …
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours Google’s Cloud Threat Horizons Report for H1 2026 details how a threat actor tracked as UNC6426 weaponized credentials …
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets Researchers at Socket have uncovered five malicious Rust packages published to crates.io — chrono_anchor, dnp3t…
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military ESET researchers have published a deep-dive on Russia’s APT28 (Fancy Bear/Sednit), revealing that the GRU-linked group has been …
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure Palo Alto Networks Unit 42 has published a detailed investigation into a previously undocumented Chinese threat…
Phobos Ransomware Leader Facing 20 Years in Prison After Pleading Guilty to Hacking Charges Evgenii Ptitsyn, the 43-year-old Russian national identified as the key developer and administrator behind t…
Iranian Drone Strikes Hit Amazon Data Centers in Gulf, Disrupting Cloud Services Iranian drone strikes directly hit two Amazon Web Services data centers in the UAE this week and caused damage to a thi…
Iranian Drone Strikes Hit Amazon Data Centers in Gulf, Disrupting Cloud Services Iranian drone strikes directly hit two Amazon Web Services data centers in the UAE this week and caused damage to a thi…
CISA Replaces Acting Director After a Bumbling Year on the Job The Trump administration has ousted Madhu Gottumukkala as acting director of the Cybersecurity and Infrastructure Security Agency, replac…
Key Takeaways An audio version of this report can be found on Spotify, Apple, YouTube, Audible, & Amazon. This intrusion began in mid-February 2024 after a threat actor exploited a vulnerability (CVE-…
Key Takeaways The DFIR Report Services Contact us today for pricing or a demo! The intrusion began in early March 2025 with a single successful Remote Desktop Protocol (RDP) logon to an internet-expos…
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May…