Security How-To

    How MintsLoader uses a Legacy Windows Binary to gain a Foothold

    24 min read | February 9, 2026

    In a recent threat hunting session undertaken by our detection engineering team, MintsLoader was observed using the legacy windows binary called finger.exe to kick off an...

    Read More
    Security Trends and Info
    15 min read | February 4, 2026

    Ransomware Protection: The 2026 Defense Playbook

    Read More
    Security How-To
    10 min read | January 12, 2026

    How to Choose a Security Operations Platform

    Read More
    Security How-To
    7 min read | January 12, 2026

    The Complete SIEM Buyer's Checklist

    Read More
    Security How-To
    1 min read | November 14, 2025

    Proven Ways to Take Control of Windows & Entra Security

    Read More
    Security How-To
    4 min read | September 4, 2025

    Cybersecurity Training in Manufacturing: Insights from the 2025 Verizon Data Breach Investigations Report

    Read More
    Security Trends and Info
    15 min read | July 25, 2025

    Why “Silent But Deadly” Infostealers Are Summer’s Hottest Trend

    Read More
    Security Trends and Info
    9 min read | July 2, 2025

    The Iranian Cyber Threat: Key Insights for IT Teams

    Read More
    Security Trends and Info
    14 min read | July 2, 2025

    What Iran-Based Activity Can Teach Us About Everyday Security Resilience

    Read More
    Security Trends and Info
    6 min read | May 28, 2025

    5 Steps to Minimize Impact After Vendor Security Incidents

    Read More
    Security Trends and Info
    9 min read | May 22, 2025

    Turn Up Your Network Defenses to Eleven. Turn Down the Noise Pollution

    Read More
    Security How-To
    2 min read | April 25, 2025

    On Demand - How Blumira Does Security Operations

    Read More
    Security Trends and Info
    3 min read | March 18, 2025

    XSS: What It Means, How It Works, and How to Prevent It

    Read More
    Security How-To
    2 min read | February 5, 2025

    On Demand - Resilient Relationship Security: Reduce Lost Connections

    Read More
    Security How-To
    3 min read | January 22, 2025

    On Demand - Maximizing Security Effectiveness with Limited Resources

    Read More
    Security How-To
    1 min read | January 14, 2025

    Normalizing Security Culture: Don't Have to Get Ready if You Stay Ready

    Read More