Please turn JavaScript on
header-image

ReliaQuest Blog - Threat Hunting, Security Operations, and More

follow.it gives you an easy way to subscribe to ReliaQuest Blog - Threat Hunting, Security Operations, and More's news feed! Click on Follow below and we deliver the updates you want via email, phone or you can read them here on the website on your own news page.

You can also unsubscribe anytime painlessly. You can even combine feeds from ReliaQuest Blog - Threat Hunting, Security Operations, and More with other site's feeds!

Title: ReliaQuest GreyMatter: The Agentic AI Security Operations Platform

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.21 / day

Message History

The market is flooded with "agentic AI" claims applied to everything from basic playbook automation to chatbot interfaces. In all the noise, security leaders have lost the ability to distinguish real capability from marketing.

But the pressure to adopt AI hasn't slowed down—every enterprise security leader is on the hunt for that AI vendor that can make their SOC faste...


Read full story

Editor’s note: This report was authored by John Dilgen & Alexa Feminella

Key points

Former “Black Basta” affiliates are highly likely evolving the group’s social engineering playbook, using automated email bombing and Teams-based social engineering to gain remote access to senior-level employees within minutes.

77% of such incidents in Mar...


Read full story
In SecOps, AI Models Are One Component. Their Environment Is the Other.

Since Anthropic announced Claude Mythos Preview, extensive media coverage has drawn serious questions and concerns from security leaders. What Mythos has already demonstrated represents a genuine leap in what frontier models are capable of. But AI models are one component of the security operations equatio...


Read full story

Brian Murphy on the Great Re-Architecture of Cybersecurity | EXPONENT 2026

At EXPONENT 2026, hundreds of security leaders gathered in Tampa around a single problem: the SOC model most enterprises rely on wasn't built for a world where attackers move at machine speed. The


Read full story

Editor’s note: This report was authored by James Xiang.

Key Points

This reporting period, trust is the key attack surface. “BaoLoader” held the top spot at 40.9% of all malware incidents and “ClickFix” drove over 44% of defense evasion activity, both by exploiting what organizations already trust.

In ransomware, groups ...


Read full story