Archive

Automating CloudFront C2 with AI – Reduce Errors & Save Time 

August 27, 2025 A well-known red team tactic for blending Command-and-Control (C2) traffic in with legitimate network traffic involves utilizing Amazon Web Services (AWS) CloudFront redirectors to mas…

A Practical Path to Cybersecurity Risk Quantification

August 15, 2025 A Primer for Security and Business Leaders As cybersecurity becomes a top concern in the boardroom, one message is becoming clear: leadership wants clarity—not just on what the risks…

Crisis Action Management Planning (CAMP) for Business Resilience

August 13, 2025 Crises aren’t a matter of if—they’re a matter of when.

Prompt Injection: The AI Vulnerability We Still Can’t Fix

August 13, 2025 Where It All Started The Artificial Intelligence (AI) industry is approaching a peculiar anniversary.

Drawing the Line: How to Define Third-Party Cyber Risk Appetite That Actually Works

August 6, 2025 Vendors and partners help businesses move faster but they also introduce cyber risk.

GRITREP: Observed Malicious Driver Use Associated with Akira SonicWall Campaign

August 5, 2025 Bottom-Line Up Front (BLUF): We have observed Akira affiliates exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall ab…

The Secret Life of APIs: Uncovering Hidden Endpoints and More

August 4, 2025 In the rapidly advancing world of web applications, single-page applications (SPAs) have become a staple for delivering a streamlined and efficient user experience.

The Strategic Power of Cyber Risk Appetite: Making Security Decisions with Clarity and Confidence

July 23, 2025 In cybersecurity, not every risk can be eliminated but every risk needs to be understood. A cyber risk appetite statement isn’t just part of a policy, it’s a decision-making tool.

The CRQ Mandate: Why Financial Risk Insight Is the Future of Cybersecurity

July 21, 2025 The CRQ Mandate: Why Financial Risk Insight Is the Future of Cybersecurity Cybersecurity today is not just a technical problem—it’s a strategic business opportunity.

F5 on How Fragmented Application Access Is Sabotaging Your Security

July 18, 2025 Guest Author: Corey Marshall, Director and Sr.

Insights from the GRIT Q2 2025 Ransomware & Cyber Threat Report

July 10, 2025 Ransomware continues to escalate, driving a more fragmented and aggressive threat landscape.

Playing the Cybersecurity Odds: How to Bet Smart in an Uncertain Economy

July 7, 2025 Playing the Cybersecurity Odds: How to Bet Smart in an Uncertain Economy Let’s face it—uncertainty is the name of the game.