PinnedScott Bolen | RONIN OWL CTIA Comprehensive Guide: Implementing AI for Cybersecurity in Your Organization1. Introduction: Understanding the Need for AI in CybersecurityDec 5, 2023Dec 5, 2023
Scott Bolen | RONIN OWL CTIOperation Endgame: Largest Ever Strike Against BotnetsIn a coordinated international effort, Europol announced the largest operation against botnets, seizing over 100 internet servers between…9h ago9h ago
Scott Bolen | RONIN OWL CTITracking Threat Actors with Digital Forensics and AIIn the dynamic world of cybersecurity, where threats are always changing, the bad guys never stop finding new ways to cause trouble. It’s…1d ago1d ago
Scott Bolen | RONIN OWL CTIThe Relentless Vigil: Top Obstacles Facing the Cyber Threat Intelligence Community in 2024 (Part 1)The digital age has ushered in an era of unparalleled innovation and connection. However, amidst the convenience and progress, a constant…6d ago6d ago
Scott Bolen | RONIN OWL CTIDecoded Deception: Unveiling the Growing Threat of Gift Card FraudGift cards, the seemingly perfect present, a convenient way to show you care without the hassle of picking the “right” gift. But beneath…May 24May 24
Scott Bolen | RONIN OWL CTIThe Q2 2024 Threatscape: Unveiling the Most Active and Malicious APTsThe shadowy realm of cyber espionage continues to defy, bend and remake the rules with Advanced Persistent Threat (APT) groups constantly…May 23May 23
Scott Bolen | RONIN OWL CTIFort Knox for Your Feeds: A Step-by-Step Guide to Fortifying Your Social Media Against Phishing…Social media platforms are a double-edged sword. While they connect us with friends and family, they also present a tempting target for…May 22May 22
Scott Bolen | RONIN OWL CTIHow APTs Use Social Engineering to Hijack Your Social MediaAdvanced Persistent Threat (APT) groups are the digital equivalent of master spies. They’re relentless, cunning, and excel at the art of…May 22May 22
Scott Bolen | RONIN OWL CTIUsing AI to Detect and Counter Malicious Actors in the Digital AgeThe world of technology is a constant battle, with malicious actors constantly evolving their tactics. Traditional security measures are…May 21May 21
Scott Bolen | RONIN OWL CTIThe Kinsing Menace: How a Persistent Hacker Group is Hijacking Your CPU for CryptoThe Kinsing hacker group (also known as H2Miner) has carved a niche for itself. This blog post delves into Kinsing’s latest tactics…May 20May 20