Intelligence tagged defensive security

Cyber Intelligence Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
A critical Microsoft 365 misconfiguration is enabling untraceable internal phishing. Learn how Echelon’s experts uncovered the issue and how to fix it fast.
Posted on Oct 23 / 2025
On-Demand: The Blue Lens Report: Defending What Matters Most - Preparing for 2026
On-Demand: The Blue Lens Report: Defending What Matters Most - Preparing for 2026
Attackers moved faster than ever in 2025. What’s next? Join experts Steve Dyson and Brayden Park as they unpack key findings from the Blue Lens Report 2025 and share practical steps to stay ahead of 2026’s biggest threats.
Posted on Sep 30 / 2025
OWASP LLM Security Checklist: Protect Large Language Model Applications (LLM)
OWASP LLM Security Checklist: Protect Large Language Model Applications (LLM)
Download the OWASP LLM Security Checklist to evaluate and secure your AI systems. Covers threat modeling, dependency checks, deployment protections, and continuous governance for LLMs.
Posted on Sep 04 / 2025
NIST AI RMF Checklist (AI 600-1): Security & Risk Mitigation for AI Systems
NIST AI RMF Checklist (AI 600-1): Security & Risk Mitigation for AI Systems
Download the NIST AI RMF (AI 600-1) Security & Risk Mitigation Checklist to safeguard your AI systems. Evaluate readiness, manage bias, privacy, and security risks with clear, actionable checkpoints.
Posted on Sep 02 / 2025
The Blue Lens: 2025 Defensive Security Report 
The Blue Lens: 2025 Defensive Security Report 
Gain a clear view of 2025’s evolving cyber threats with real-world breach insights and a practical defense roadmap for security leaders.
Posted on Jun 05 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization. 
Posted on Mar 04 / 2025
Fortify Your Business with Echelon’s Next-Generation Managed Defensive Security Services
Fortify Your Business with Echelon’s Next-Generation Managed Defensive Security Services
Explore Echelon Risk + Cyber's Managed Defensive Security Services, a comprehensive suite protecting your organization with expert-led solutions for Microsoft 365, cloud security, threat management, and firewalls. Download checklists and capabilities overview briefs to strengthen your defenses. 
Posted on Jan 23 / 2025
Cybersecurity Trends and Predictions for 2025: Expert Insights to Stay Ahead 
Cybersecurity Trends and Predictions for 2025: Expert Insights to Stay Ahead 
Discover the key cybersecurity predictions for 2025 as industry experts explore the transformative role of AI, the critical importance of employee training, navigating compliance challenges, and strategies to counter evolving threats like ransomware and social engineering. 
Posted on Dec 04 / 2024
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
Learn more about the critical vulnerability found recently in the PAN-OS management interface by the CISA. 
Posted on Nov 21 / 2024
Comprehensive Guide: The Security Risks of Generative AI
Comprehensive Guide: The Security Risks of Generative AI
Written by Echelon’s Cybersecurity Associate, John Hurd, our guide, "The Security Risks of Generative AI," dives deep into the potential pitfalls and offers strategic insights to help you safeguard your organization.
Posted on Jul 24 / 2024
Adaptability and Perseverance – Breaking Down the 2023 CrowdStrike Global Threat Report
Adaptability and Perseverance – Breaking Down the 2023 CrowdStrike Global Threat Report
Here are our key takeaways from CrowdStrike's 2023 Global Threat Report. Discover the latest threat trends and explore recommendations for staying ahead of threats.
Posted on May 23 / 2023
Busting Myths about Microsoft 365 Security (Healthcare Edition)
Busting Myths about Microsoft 365 Security (Healthcare Edition)
Uncover the truth about Microsoft 365 security in healthcare organizations. Learn why myths about security tools, Microsoft's default settings, third-party filters, and HIPAA certification can leave your organization vulnerable.
Posted on May 23 / 2023
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
The year 2021 brought about some serious cyber challenges. This article summarizes key takeaways from CrowdStrike's Global Threat Landscape report, provides a breakdown of the five 2021 themes, and gives our take on seven recommendations that resonate most with us.
Posted on Apr 01 / 2022
A Hacker’s Perspective: How to Create a Strong Password (Hint, Length Matters!)
A Hacker’s Perspective: How to Create a Strong Password (Hint, Length Matters!)
From a hacker’s perspective, the essence of password security boils down to two things: how guessable is it and how easy is it to crack encrypted passwords. Here are our tips for creating stronger passwords.
Posted on Aug 24 / 2021
Are you ready to get started?