📣 Attention cyber defenders! In case you missed it, Cyborg Security was acquired by Intel 471 in May 2024. But don't worry, our commitment to delivering top-notch threat hunting content is stronger than ever! Make sure to follow Intel 471 to stay updated on all things threat hunting. As part of the Intel 471 LinkedIn community, you’ll get content like: ⭐️ How-to videos on threat hunting techniques: Practical guides to help you identify and mitigate threats more effectively. ⭐️ Monthly cyber threat update reports from the HUNTER Platform: Stay informed with the latest threat data and analysis on emerging risks. ⭐️ Threat hunting blogs, case studies, and white papers: Dive deep into expert insights, real-world case studies, and in-depth research on advanced threat hunting topics. ⭐️ Updates on upcoming Threat Hunting Workshops: Invitations to hands-on sessions that will enhance your threat hunting capabilities. ⭐️ Insights on the latest emerging threats: Stay ahead with timely information on new and evolving threats. Join us at Intel 471 and be part of the community that's driving the future of intelligence-led threat hunting. See you there, hunters! 🤓 https://hubs.la/Q02PnRqF0 #threathunting #cybersecurity #threatintelligence #informationsecurity #cybersecurityprofessionals #securityoperationscenter
Cyborg Security, Now Part of Intel 471
Computer and Network Security
Orlando, Florida 8,974 followers
Cyborg Security is now a part of Intel 471! Learn more at intel471.com
About us
Cyborg Security is now a part of Intel 471! Learn more at intel471.com
- Website
-
https://intel471.com/
External link for Cyborg Security, Now Part of Intel 471
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Orlando, Florida
- Type
- Privately Held
- Founded
- 2019
- Specialties
- SOC, Security Operations, Threat Detection, Cyber Intelligence, Threat Hunting, Threat Intelligence, Threat Detection, and Information Security
Locations
-
Primary
Orlando, Florida, US
Employees at Cyborg Security, Now Part of Intel 471
-
David Amsler
CEO & Founder of Cyborg Security | Threat Hunting and Cyber Security Evangelist | Cyber Security Investor
-
Eric Sigman
VP of Sales - Threat Hunting at Intel 471 | Previous Co-Founder at Cyborg Security
-
Jamal Awnallah
Director at Cyborg Security Group
-
RAVI KUMAR
“Don’t wish it were easier. Wish you were better.”
Updates
-
Cyborg Security, Now Part of Intel 471 reposted this
November 20, 2024, 12:00 - 1:00 PM ET: Join us for a hands-on workshop centered on the MITRE ATT&CK Discovery tactic (TA0007). Guided by our experts, this session will sharpen your skills in proactively identifying and disrupting potential attacker movements within your network. You’ll work directly with advanced tools in a realistic environment, gaining practical skills to take back to your organization. Complete the final challenge, and you’ll earn the "Threat Hunting – Discovery (Level I)" certification, a testament to your ability to stay ahead of adversaries. Perfect for cybersecurity pros ready to elevate their threat hunting approach. Sign up today: https://lnkd.in/gKsPcCP8 #threathunting #threatintelligence #cybersecurity #threathuntingworkshop #MITREATTACK #discovery
-
Cyborg Security, Now Part of Intel 471 reposted this
Mark your calendar for December 5th from 12:00 - 1:30 PM ET and join a special, holiday-themed episode of Out of the Woods: The Threat Hunting Podcast! This live event offers a unique, interactive experience on Discord, where you can connect with our hosts, participate in polls, ask questions, and engage with the cybersecurity community in real-time. In this episode, we’ll discuss what it takes to reach the “ideal outcome” in threat hunting, covering the must-have security stack, the impact of a well-structured hunt, and how to build lasting synergy within your team. Join us to explore the best practices and participate in the conversation. #threathunting #cybersecuritypodcast #threatintelligence #threathunters #outofthewoods
This content isn’t available here
Access this content and more in the LinkedIn app
-
Cyborg Security, Now Part of Intel 471 reposted this
In the latest "Happy Hunting" session, Lee Archinal breaks down how adversaries like Berserk Bear exploit PsExec, a legitimate administrative tool, to navigate networks undetected. Initially designed for remote operations, PsExec enables threat actors to create accounts, execute code, and escalate privileges from admin to SYSTEM level, making it highly effective for lateral movement. Lee shares proactive methods to identify signs of PsExec abuse, from irregular service creation to unexpected parent processes. The "Metasploit / Impacket PsExec Process Creation Activity" hunt package on the HUNTER471 Platform includes resources for tracking these behaviors, helping you stay ahead of similar tactics. Sign up for a free HUNTER471 Community Account to access this hunt package and a variety of other hunt packages: https://lnkd.in/gCYdxx32 #ThreatHunting #PsExec #APT #CyberSecurity #Intel471
-
Cyborg Security, Now Part of Intel 471 reposted this
🚨 EMERGING THREAT ALERT: FOG RANSOMWARE 🚨 Fog Ransomware, first seen in April 2024, primarily targets the U.S. education sector, as well as travel, financial, and manufacturing entities. While the operators remain unidentified, they are financially motivated and employ double extortion tactics. Initial access is typically gained through compromised VPN credentials, with malware variants for both Windows and Linux. Recently, Fog operators have exploited a SonicOS flaw (CVE-2024-40766) in unpatched SonicWall devices, contributing to at least 30 intrusions alongside Akira ransomware. Research indicates potential infrastructure sharing between Akira and Fog. Another recent vulnerability, impacting Veeam Backup and Replication services (CVE-2024-40711), has also been exploited for remote code execution. Fog Ransomware remains an active threat, posing significant risk that organizations should be prepared to address. **Immediate action is necessary. We have released a Hunt Collection to help organizations identify and mitigate this threat. Access the collection here: https://hubs.la/Q02WkhH40) Don't have an account yet? Join the HUNTER471 Community today and get free access to behavioral hunting content: https://hubs.la/Q02Wkk6q0 🔗 Full Report: https://hubs.la/Q02WkjdG0 #emergingthreat #threathunting #cybersecurity #infosec #threatintelligence #fogransomware #ransomware #cyberthreats
-
Cyborg Security, Now Part of Intel 471 reposted this
🚨 Workshop Alert! Strengthen your threat hunting capabilities with our upcoming session focused on the MITRE ATT&CK Discovery tactic (TA0007). This workshop will help you recognize and disrupt adversarial reconnaissance activities within your network. The session is divided into two parts. First, we'll explore using threat intelligence to identify attackers' discovery techniques. Then, you'll move into a live, hands-on threat hunt, applying advanced tools and methods in real time under expert guidance. After completing the final challenge, you'll earn the "Threat Hunting – Discovery (Level 1)" certification to showcase your skills. Join us virtually on November 20, 2024, from 12-1 PM ET, with complimentary access to top-tier hunting tools. This is a unique opportunity to gain practical experience, engage with industry professionals, and see threat hunting in action. Register today! #threathunting #threatintel #cybersecurity #threathuntingworkshop #MITREATTACK
This content isn’t available here
Access this content and more in the LinkedIn app
-
Cyborg Security, Now Part of Intel 471 reposted this
🚨 EMERGING THREAT ALERT: SALT TYPHOON THREAT GROUP 🚨 Salt Typhoon is an APT threat actor that has most recently and publicly breached the systems of major United States based telecommunication providers (specifically ISPs) in September/October of 2023 - the networks affected by the breach included Verizon Communications, AT&T and Lumen Technologies. Considered to be an extremely damaging cyber espionage campaign, the threat actors claimed to have been entrenched in their systems for 'months'. The intrusion gave attackers access to proprietary intelligence and law enforcement data, exploiting systems used for what is understood as lawful wiretapping. The threat actor Salt Typhoon (also known as GhostEmperor, Famous Sparrow or UNC2286), has been active since 2020 and is operated by the Chinese Government to conduct cyber espionage campaigns against targets in North America, Southeast Asia, and Europe. It is also worthy to note that the industries that the threat actor has been observed to attack include telecommunications, government and information technology. **Immediate action is necessary. We have released a Hunt Collection to help organizations identify and mitigate this threat. Access the collection here: https://hubs.la/Q02THc-N0 Don't have an account yet? Join the HUNTER Community today and get free access to behavioral hunting content: https://hubs.la/Q02TH43x0 🔗 Full Report: https://hubs.la/Q02THqGl0 #emergingthreat #threathunting #cybersecurity #infosec #threatupdate #threatintel #salttyphoon #threatgroup #cyberthreats
-
Cyborg Security, Now Part of Intel 471 reposted this
🚨 EMERGING THREAT ALERT: BUMBLEBEE LOADER 🚨 UPDATE 10/15/2024: Two additional hunt packages have been added pertaining to Bumblebee Loader. This content focuses on behaviors observed and identified in recent campaign(s) taking place in early October 2024. These campaigns included the use of phishing e-mails masquerading as account department announcements, leading to the download of malicious ZIP archives. Additionally, behavior utilizing single character named files being used for execution and the usage of out of the ordinary Dynamic Link Library (DLL) file drop locations was observed as well. **Immediate action is necessary. We have released a Hunt Collection to help organizations identify and mitigate this threat. Access the collection here: https://hubs.la/Q02TtDmr0 Don't have an account yet? Join the HUNTER Community today and get free access to behavioral hunting content: https://hubs.la/Q02Ttgdq0 🔗 Full Report: https://hubs.la/Q02Tt1T70 #emergingthreat #threathunting #cybersecurity #infosec #threatupdate #threatintel #bumblebeeloader
-
Cyborg Security, Now Part of Intel 471 reposted this
Join us tomorrow, October 2, 2024, from 12:00 - 1:00 PM ET for an interactive, hands-on workshop focused on the MITRE ATT&CK Tactic of Collection. You’ll actively participate in live threat hunts, using real-world data within an enterprise-grade environment to identify collection-based threats. Guided by Intel 471’s experts, you’ll learn how to operationalize threat intelligence and enhance your threat hunting capabilities. Gain valuable skills you can immediately apply to protect your organization. Secure your spot now: https://hubs.la/Q02RxC5g0 #ThreatHunting #ThreatIntelligence #Cybersecurity #MITREATTACK
Threat Hunting Workshop: Hunting for Collection
-
Cyborg Security, Now Part of Intel 471 reposted this
AsyncRAT is a versatile remote access tool (RAT) often used in malicious campaigns, offering features like keylogging and remote desktop control, making it a common choice for cybercriminals. In this episode of "Happy Hunting", Lee Archinal breaks down the behaviors of AsyncRAT and shows how threat hunters can identify patterns—such as batch file executions in temp directories. Watch now to learn how you can track these techniques using the Execution Bat Script to Unpack Payload Hunt Package on the 471HUNTER Platform. Get your free 471HUNTER Community Account to access this hunt package and more: https://hubs.ly/Q02R5NYK0 Already have a Community Account? Jump straight to the hunt package: https://hubs.ly/Q02R5QrY0 #AsyncRAT #ThreatHunting #CyberSecurity #Malware #ThreatIntel #SecurityOperationsCenter #ThreatIntelligence