Designing Blue Team playbooks with Wazuh for proactive cyber defense

Blue Teams are essential for defending organizational IT environments through incident detection, response, and operational continuity, often guided by structured playbooks. Wazuh enhances these efforts with real-time monitoring, automated responses, and threat detection, supporting various attack scenarios like credential dumping, web shells, and brute-force attacks. #Wazuh #BlueTeamPlaybook

Read More
Threat Research | Weekly Recap [08 June 2025]

This week’s cybersecurity recap highlights ongoing threats from phishing and social engineering campaigns targeting various sectors, including finance and government, with sophisticated tactics like fake CAPTCHA frameworks and Phishing-as-a-Service platforms. Malware developments include stealthy RATs such as DuplexSpy and Chaos RAT, along with advanced infostealers like OtterCookie, all posing significant risks to corporate and crypto assets; supply chain threats involve malicious repositories and compromised developer tools. The report also covers notable APT activities by groups like UNC5174, OilRig, and Kimsuky, alongside infrastructure attacks exploiting IoT and cloud misconfigurations. Emerging tools like RayV Lite facilitate hardware-level attacks, illustrating the evolving landscape of cyber threats. #ClickFix #FlowerStorm #LazarusGroup #ChaosRAT #Mirai #RayVLite

Read More
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate

Nine Chinese nationals were sentenced to prison in Nigeria for their roles in a cybercrime syndicate involving identity theft and online fraud. The Nigerian EFCC conducted a large raid, arresting hundreds of suspects and uncovering a network that recruits and trains Nigerian youths for international cybercriminal activities. #EFCC #OperationEagleFlush…

Read More
Detection-as-Code & CI/CD for Detection Engineering with Dennis Chow | Detection Opportunities EP 9

This video discusses detection as code, emphasizing automation for security detection pipelines using CI/CD, synthetic AI testing, and policy as code with cloud custodian in GCP. Practical demonstrations include setting up detection pipelines, deploying security policies, and decoding PubSub messages, highlighting modern detection engineering practices. #DetectionAsCode #CloudCustodian

Read More