Halcyon BLOG

Expert analysis on cybersecurity Trends, Topics, Tactics, Techniques, Tradecraft, Tools, & Technology.
Category filter:AllAudioCyber ResilienceCybersecurity ROICybersecurity StrategyGalleryImageIncident ResponseManaged Security ServicesResilienceRisk ManagementSmall Business SecurityVideo
No more posts
26/Nov/2025
shad01

As small businesses rapidly adopt cloud services and digital tools to stay competitive, they’re also unknowingly opening the door to a dangerous and growing threat: Shadow IT. Shadow IT refers to the use of software, devices, and services without approval or oversight from your IT or security team. It’s an invisible risk — and for small and medium-sized businesses (SMBs) without full-time cybersecurity resources, it’s becoming a leading cause of data breaches, compliance violations, and operational disruption.


26/Nov/2025
Living-Off-The-Land-blog

Living-off-the-land (LotL) attacks are quietly dismantling traditional security defenses — all without tripping alarms. Unlike malware that relies on suspicious binaries or flashy payloads, LotL techniques use legitimate tools already present in your system — PowerShell, WMI, MSHTA, certutil, rundll32 — to carry out malicious operations. That’s what makes them so dangerous.


26/Nov/2025
portfolio_10-1200x800.jpg

Dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Mirum est notare quam littera gothica, quam nunc putamus parum claram, anteposuerit litterarum formas humanitatis per qui nunc nobis videntur parum clari, fiant sollemnes in futurum.


26/Nov/2025
portfolio_04-1-1200x900.jpg

Ut wisi enim ad minim veniam, quis nostrud exerci tation ulla. Mirum est notare quam littera gothica, quam nunc putamus parum claram, anteposuerit litterarum formas humanitatis per seacula quarta decima et quinta decima. Eodem modo typi, qui nunc nobis videntur parum clari, fiant sollemnes in futurum.


26/Nov/2025
portfolio_08-1200x800.jpg

Euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Mirum est notare quam littera gothica, quam nunc putamus parum claram, anteposuerit litterarum formas humanitatis per seacula quarta decima et quinta decima. Eodem modo typi, qui nunc nobis videntur parum clari, fiant sollemnes in futurum.


26/Nov/2025
MFA01

You implemented MFA and thought you were safe. Think again. Today's phishing kits are smarter, faster, and built to sidestep even modern defenses. Here's how your business can stay ahead—without stretching your security budget. For years, Multi-Factor Authentication (MFA) has been touted as the silver bullet for account security. And rightly so—MFA blocks over 99% of credential-based attacks, according to Microsoft.


26/Nov/2025

Yeah, well, you know, that’s just, like, your opinion, man.

The Dude

Lobortis nisl ut aliquip ex ea commodo consequat. Mirum est notare quam littera gothica, quam nunc putamus parum claram, anteposuerit litterarum formas humanitatis per seacula quarta decima et quinta decima. Eodem modo typi, qui nunc nobis videntur parum clari, fiant sollemnes in futurum.


26/Nov/2025

Vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla. Mirum est notare quam littera gothica, quam nunc putamus parum claram, anteposuerit litterarum formas humanitatis per seacula quarta decima et quinta decima.