Check Point Research40 · 2026-03-04 03:16
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
Key Findings Introduction As highlighted in the Cyber Security Report 2026, cyber operations have increasingly become an additional tool in interstate conflicts, used both to support military operations and to enable ongoing battle damage assessment (BDA). During the 12-day conflict between Israel and Iran in June 2025, the compromise of cameras was likely used to support […] The post Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East appeared first on C...
Mandiant | Transform Your Cybersecurity12 · 2026-03-04 16:00
Threat Hunting with Google Threat Intelligence - Episode 6
In this new episode of Threat Hunting with Google Threat Intelligence, we go beyond basic detection to explore how to proactively unmask sophisticated phishing operations. We will demonstrate advanced techniques to identify phishing infrastructure targeting specific brands. Furthermore, we will dive into the analysis of phishing kits, showing you how to hunt their components to start tracking new phishing websites and kits as they are uploaded to GTI. Join us to learn how to: - Track adversar...
Black Hills Information Security8 · 2026-03-04 14:00
The “P” in PAM is for Persistence: Linux Persistence Technique
Learn about a pentesting tool using the Pluggable Authentication Module for privilege escalation, lateral movement, and persistence in Linux. The post The “P” in PAM is for Persistence: Linux Persistence Technique appeared first on Black Hills Information Security, Inc. .