Group Purchasing
Group Purchasing

Cybersecurity Blogs

Stay informed with the latest cybersecurity insights and trending topics from SANS faculty and industry thought leaders. Explore in-depth analysis, training updates, and expert perspectives deepening your knowledge and skills.

Filter by:

AI Vulnerability Discovery Is Already Here. We Have Been Doing It for 15 Months.

BlogArtificial Intelligence
  • 17 Apr 2026
  • Ed Skoudis
Red Cloud Upload Symbols

Coinage: The SANS Offensive Operations Coins Backstory

BlogOffensive Operations
  • 15 Apr 2026
  • Ed Skoudis
The SANS Offensive Operations Coins Backstory

AirSnitch and Wi-Fi Client Isolation: What Security Teams Actually Need to Know

BlogOffensive Operations
  • 3 Apr 2026
  • SANS Institute
Blue Electronic Abstract

What We Learned: Axios NPM Supply Chain Compromise Emergency Briefing

BlogCyber Defense
  • 1 Apr 2026
  • SANS Institute
Glowing Text Bubble on Surface

Axios NPM Supply Chain Compromise: Malicious Packages Deliver Remote Access Trojan

BlogCyber Defense
  • 31 Mar 2026
  • Joshua Wright
Pensive man staring at laptop

Visual Summary of SANS Hack & Defend Summit 2025

BlogOffensive Operations
  • 28 Oct 2025
  • SANS Institute
The Hunt for Silent Compromise: Detecting Cloud-Native Persistence Without Malware or Alerts

Authorization Sprawl: The Hidden Vulnerability Reshaping Modern Cyberattacks

BlogOffensive Operations
  • 16 Oct 2025
  • Joshua Wright
Authorization Sprawl: The Hidden Vulnerability Reshaping Modern Cyberattacks: Authorization Sprawl Attack Path

Crack the Riddle, Secure the Oasis: Core NetWars Version 11 is Here

BlogCyber Defense
  • 7 Jul 2025
  • SANS Institute
3D Glowing Text Bubble

Visual Summary of SANS Emerging Threats Summit 2025

BlogDigital Forensics and Incident Response
  • 14 May 2025
  • SANS Institute
SANS Emerging Threats Summit 2025: Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams

A Visual Summary of SANS New2Cyber Summit 2025

BlogSecurity Awareness
  • 13 Mar 2025
  • SANS Institute
Woman Smiling with Laptop

Continuous Penetration Testing - A Consultant’s Perspective

BlogOffensive Operations
  • 11 Mar 2025
  • Joshua Wright
Woman working on laptop

Breaking the Grid: Automating Offensive Strategies in OT Security with CALDERA

BlogOffensive Operations
  • 14 Feb 2025
  • Jeroen Vandeleur
Bright fiber wires