Featured Defending energy infrastructure in the age of Mythos The DOE’s CESER strategy highlights growing risks in energy cybersecurity, but real-world challenges around visibility, data, and pace continue to... Gregory Bell Apr 17, 2026
Zeek Detect C2 ‘RedXOR’ with state-based functionality A very interesting Linux-based command-and-control (C2) malware was described by the research team at Intezer. Here are a few points about this... Ben Reardon Apr 20, 2021