Intelligence Insights: November 2025 The Red Canary Blog: Information Security Insights 2 days 21 hours ago JustAskJacky jeopardizes users and Rhadamanthys rises in this month's edition of Intelligence Insights The Red Canary Team
Empowering your SOC: The strategic imperative of building reliable AI agents The Red Canary Blog: Information Security Insights 3 days 18 hours ago Read our practical guide on how to build reliable AI agents for security operations—along with open source code and a workflow graph Jimmy Astle
Stay on top of GitHub vulnerabilities with Dependabot Configurator The Red Canary Blog: Information Security Insights 4 days 22 hours ago Red Canary's newest open source tool helps automate dependency management throughout your GitHub repositories Matt McKinley
Sniffing out TruffleHog in AWS The Red Canary Blog: Information Security Insights 1 week 2 days ago How Red Canary detected cloud activity tied to the Salesloft Drift supply chain attack before it was made public. Laura Brosnan
A defender’s guide to phishing The Red Canary Blog: Information Security Insights 2 weeks 2 days ago Experts from Red Canary, MITRE ATT&CK®, and CrowdStrike walk through how to detect and prevent the many varieties of phishing. Susannah Clark Matt
Red Canary CFP tracker: November 2025 The Red Canary Blog: Information Security Insights 2 weeks 5 days ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: October 2025 The Red Canary Blog: Information Security Insights 3 weeks 2 days ago AI agents, threat hunting 101, supply chain scaries, and more: Catch up on the last month's episodes of Red Canary Office Hours.
Unmasking risks that haunt your supply chain The Red Canary Blog: Information Security Insights 3 weeks 2 days ago A spooky guide to supply chain vulnerabilities with advice on how to scare off adversaries from your system Laura Brosnan
The art and science of effective security storytelling The Red Canary Blog: Information Security Insights 3 weeks 5 days ago Three criteria for assessing quality security data that enables faster responses and effective ROI storytelling Matt Graeber
Intelligence Insights: October 2025 The Red Canary Blog: Information Security Insights 4 weeks 2 days ago Tampered Chef serves up a smorgasbord of suspicious activity in this month’s edition of Intelligence Insights The Red Canary Team
Commanding attention: How adversaries are abusing AI CLI tools The Red Canary Blog: Information Security Insights 1 month 1 week ago Adversaries are taking to the command line, abusing AI tools like Claude Code to launch malicious prompts and steal credentials. Jesse Griggs
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon The Red Canary Blog: Information Security Insights 1 month 1 week ago Set sail with us as we compare and contrast three of the biggest players in the macOS stealer ecosystem: Atomic, Poseidon, and Odyssey Tony Lambert
Red Canary CFP tracker: October 2025 The Red Canary Blog: Information Security Insights 1 month 3 weeks ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: September 2025 The Red Canary Blog: Information Security Insights 1 month 3 weeks ago Phishing campaigns dropping RMM tools and WordPress sites delivering malware: Catch up on the last month of Red Canary Office Hours
Redefining incident response in the age of AI The Red Canary Blog: Information Security Insights 1 month 3 weeks ago Our updated Incident Response and Readiness guide provides a blueprint for responsibly incorporating AI into your IR program. Laura Brosnan
Intelligence Insights: September 2025 The Red Canary Blog: Information Security Insights 1 month 3 weeks ago King KongTuke debuts at no. 1, and we offer detection opportunities for paste-and-run-lures in this month’s edition of Intelligence Insights The Red Canary Team
Double agents: How adversaries can abuse “agent mode” in commercial AI products The Red Canary Blog: Information Security Insights 1 month 4 weeks ago As AI assistants become capable of performing actions on behalf of a user, be on the lookout for “AI-in-the-middle (AIitM) attacks” Alex Walston
Node problem: Tracking recent npm package compromises The Red Canary Blog: Information Security Insights 1 month 4 weeks ago Recent npm supply chain attacks highlight why robust mitigation and response strategies are required for both developers and users. Tony Lambert
You’re invited: Four phishing lures in campaigns dropping RMM tools The Red Canary Blog: Information Security Insights 2 months 1 week ago Joint research from Red Canary Intelligence and Zscaler threat hunters spotlights phishing campaigns dropping RMM tools Red Canary Intelligence
Understanding OAuth application attacks and defenses The Red Canary Blog: Information Security Insights 2 months 2 weeks ago Red Canary’s Threat Hunting team recently uncovered a malicious OAuth application attack, demonstrating the need for specific defenses. Chris Brook