Intelligence in Defensive Security

Cyber Intelligence Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
2025 in Review: Top Cybersecurity Articles You Can’t Miss
2025 in Review: Top Cybersecurity Articles You Can’t Miss
2025 was a defining year for cybersecurity, and this article brings together the insights that mattered most. Inside, you’ll find Echelon’s top reports and articles covering real-world threats, defensive gaps, compliance shifts, and lessons learned across industries. It’s a guided entry point into the stories and strategies worth revisiting as you plan what comes next.
Posted on Dec 17 / 2025
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
A critical Microsoft 365 misconfiguration is enabling untraceable internal phishing. Learn how Echelon’s experts uncovered the issue and how to fix it fast.
Posted on Oct 23 / 2025
OWASP LLM Security Checklist: Protect Large Language Model Applications (LLM)
OWASP LLM Security Checklist: Protect Large Language Model Applications (LLM)
Download the OWASP LLM Security Checklist to evaluate and secure your AI systems. Covers threat modeling, dependency checks, deployment protections, and continuous governance for LLMs.
Posted on Sep 04 / 2025
NIST AI RMF Checklist (AI 600-1): Security & Risk Mitigation for AI Systems
NIST AI RMF Checklist (AI 600-1): Security & Risk Mitigation for AI Systems
Download the NIST AI RMF (AI 600-1) Security & Risk Mitigation Checklist to safeguard your AI systems. Evaluate readiness, manage bias, privacy, and security risks with clear, actionable checkpoints.
Posted on Sep 02 / 2025
Texas Cybersecurity Safe Harbor Law (SB 2610): 10 Things Small and Mid-Sized Businesses Must Know Before September 1, 2025
Texas Cybersecurity Safe Harbor Law (SB 2610): 10 Things Small and Mid-Sized Businesses Must Know Before September 1, 2025
On June 20, 2025, Governor Greg Abbott signed the Texas Cybersecurity Safe Harbor Law (SB 2610). This law takes effect on September 1, 2025, and brings major changes for small and mid-sized Texas businesses that handle sensitive personal information.If your organization has fewer than 250 employees, this law could protect you from punitive damages after a data breach—but only if you maintain a documented, compliant cybersecurity program.
Posted on Aug 27 / 2025
The Blue Lens: 2025 Defensive Security Report 
The Blue Lens: 2025 Defensive Security Report 
Gain a clear view of 2025’s evolving cyber threats with real-world breach insights and a practical defense roadmap for security leaders.
Posted on Jun 05 / 2025
Navigating the 2024 Updates to ISA/IEC 62443 
Navigating the 2024 Updates to ISA/IEC 62443 
This article outlines the major 2024 updates to the ISA/IEC 62443 standards, focusing on changes to governance, supply chain security, monitoring practices, and workforce training. It highlights how Echelon’s Risk and Audit Assessment services can help organizations in manufacturing and the defense industrial base understand and implement these updates effectively. 
Posted on May 21 / 2025
Service Accounts and Privileged Access Management (PAM) Best Practices 
Service Accounts and Privileged Access Management (PAM) Best Practices 
Learn service account and PAM best practices to reduce risk, prevent privilege abuse, and improve security with actionable strategies and tools. 
Posted on May 15 / 2025
Cyber Threat Alert: Abusing AZUREADSSOACC for Pivoting from On-Premises Active Directory to Azure 
Cyber Threat Alert: Abusing AZUREADSSOACC for Pivoting from On-Premises Active Directory to Azure 
Learn how threat actors exploit AZUREADSSOACC to pivot from on-premises Active Directory to Azure. Get actionable defenses to secure your hybrid identity environment. 
Posted on Mar 19 / 2025
Managed Firewall Services: Enhancing Security and Simplifying Operations 
Managed Firewall Services: Enhancing Security and Simplifying Operations 
Discover how Managed Firewall Services enhance cybersecurity, reduce complexity, and ensure compliance with 24/7 expert management and proactive threat prevention. 
Posted on Mar 11 / 2025
Zero Trust in Identity and Access Management: Best Practices, Challenges, and How to Get Started 
Zero Trust in Identity and Access Management: Best Practices, Challenges, and How to Get Started 
Learn how Zero Trust enhances Identity and Access Management (IAM) with best practices, real-world challenges, and practical steps for a seamless implementation. Secure your organization with Echelon's expertise. 
Posted on Mar 05 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization. 
Posted on Mar 04 / 2025
The Security Paradox: Flaws in DeepSeek Expose Industry-Wide AI Safety Challenges   
The Security Paradox: Flaws in DeepSeek Expose Industry-Wide AI Safety Challenges   
DeepSeek R1’s security flaws highlight critical AI safety risks, from data exposure to adversarial attacks. Learn how vulnerabilities in open-source AI models compromise cybersecurity and what mitigation strategies organizations should adopt. 
Posted on Feb 13 / 2025
Fortify Your Business with Echelon’s Next-Generation Managed Defensive Security Services
Fortify Your Business with Echelon’s Next-Generation Managed Defensive Security Services
Explore Echelon Risk + Cyber's Managed Defensive Security Services, a comprehensive suite protecting your organization with expert-led solutions for Microsoft 365, cloud security, threat management, and firewalls. Download checklists and capabilities overview briefs to strengthen your defenses. 
Posted on Jan 23 / 2025
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
We’re excited to share the 5 most-read articles of the year. These articles stand out for their relevance, depth, and impact on the ongoing cybersecurity dialogue. Whether you’re a seasoned pro or just starting to dive into the world of cybersecurity, these pieces offer valuable perspectives on the challenges and solutions facing today’s digital landscape.
Posted on Dec 18 / 2024
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
Learn more about the critical vulnerability found recently in the PAN-OS management interface by the CISA. 
Posted on Nov 21 / 2024
Best Practices for Role-Based Access Control (RBAC) 
Best Practices for Role-Based Access Control (RBAC) 
In today’s digital world, managing access is essential for security, efficiency, and compliance. Role-Based Access Control (RBAC) simplifies this by assigning roles and granting access based on those roles, rather than individual permissions. This ensures consistent, well-managed access across the organization, making RBAC one of the most effective security methods. In this article, we'll explore RBAC, its implementation challenges, and practical tips for maintaining an effective system as organizations scale. 
Posted on Nov 13 / 2024
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Discover expert strategies from Echelon to enhance your organization's cybersecurity during Cybersecurity Awareness Month. Learn about training enhancements, cyber exercise benefits, internal testing, and building a culture of awareness to strengthen cyber defenses. 
Posted on Oct 01 / 2024
Network Vulnerability Basics: Securing Every Layer of the OSI Model 
Network Vulnerability Basics: Securing Every Layer of the OSI Model 
The OSI Model, or Open Systems Interconnection Model, is a way to break down how networked devices communicate into seven layers. It was developed in the late ‘70s and published by the International Organization for Standardization (ISO) in 1984.  This article details the vulnerabilities and recommended remediations of each layer of the OSI model. It will be helpful for anyone just starting their cybersecurity career, as well as a refresher for our long timers.
Posted on Sep 25 / 2024
The Language Revolution: Enhancing Cybersecurity with Large Language Models
The Language Revolution: Enhancing Cybersecurity with Large Language Models
In this article, Renata Uribe Sánchez explores the transformative impact of large language models (LLMs) in the field of cybersecurity. LLMs, particularly Transformers, are powerful tools within deep neural networks that can interpret and generate natural language, making them invaluable in various applications. The article discusses the benefits of integrating LLMs into cybersecurity, including advanced threat detection, phishing prevention, malware detection, and investigative data analysis. It also highlights the challenges associated with biases, AI-driven hacking, and data privacy.
Posted on Sep 18 / 2023
Busting Myths about Microsoft 365 Security (Healthcare Edition)
Busting Myths about Microsoft 365 Security (Healthcare Edition)
Uncover the truth about Microsoft 365 security in healthcare organizations. Learn why myths about security tools, Microsoft's default settings, third-party filters, and HIPAA certification can leave your organization vulnerable.
Posted on May 23 / 2023
Why Every Healthcare Organization Should Assess their Microsoft 365 Environment
Why Every Healthcare Organization Should Assess their Microsoft 365 Environment
Healthcare organizations should assess their Microsoft 365 environment to protect sensitive data and reduce cyber threats. Read on to learn more.
Posted on May 10 / 2023
Hacker's Perspective: A Modern Approach to Cross-Site Request Forgery
Hacker's Perspective: A Modern Approach to Cross-Site Request Forgery
Learn how to locate and exploit Cross-Site Request Forgery (CSRF) vulnerabilities in modern web applications by understanding client-side and server-side code interactions, CSRF tokens, and SameSite cookie policies.
Posted on May 10 / 2023
Are you ready to get started?