Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#threat-hunting

Graphic promoting the Sentinels League 2026 Threat Hunting World Championship
Security Tools

Threat Hunting Championship: $100K Prize Pool & New 30-Min Format

The global threat hunting stage is set. SentinelOne’s Sentinels League 2026 ups the ante with a massive prize pool and a faster-paced competition, pushing defenders to their limits.

7 min read 1 day, 4 hours ago
A network diagram showing a central node labeled 'mdrfckr campaign' connecting to multiple external IP addresses, some with older signature icons and one with a new, updated signature icon.
Ransomware & Malware

[2026] Malware Evolves: Old Botnet Uses New LibSSH

The malware game is stale. Or so you thought. This aging botnet, a relic from 2018, just dropped a new flavor of its attack.

5 min read 6 days, 11 hours ago
A diagram comparing chaotic manual security detection processes with a structured code-based approach.
Security Tools

Security Detections: From Chaos to Code [Rapid7's Approach]

For years, software development has had discipline. Security detection? Not so much. Rapid7 is trying to fix that with 'Detection as Code,' a move that’s long overdue.

7 min read 2 weeks, 1 day ago
Table of suspicious honeypot login attempts with usernames like 'youjustgotindexed'
Security Tools

Attackers Taunt Honeypots with Absurd Logins – And They're Winning

What if your cyber traps are screaming 'fake' to the pros? Attackers are fingerprinting honeypots with cheeky tactics, from bogus installs to troll passwords – exposing a cat-and-mouse game that's tilting toward the mice.

5 min read 1 month, 1 week ago
AI demo on RSAC 2026 stage showing threat detection in action
Security Tools

RSAC 2026: AI's Cyber Arms Race Accelerates — But Who's Winning?

Spotlights blazing on the RSAC 2026 stage, demos of AI agents dismantling simulated ransomware in seconds. But beneath the wow factor, cracks in the architecture hint at tomorrow's nightmares.

5 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details