Volt Typhoon and the Importance of Proactive Cyber Defense

In the ever-evolving landscape of cyber threats, a new storm is brewing. The state-sponsored actor, Volt Typhoon, has…

Read More

The Hidden Chronicles of Turla: The Pinnacle of Russia’s…

In a fascinating article about Turla, the enigmatic hacker group, Andy Greenberg, spins a tale in the murky depths of…

Read More

APT28 Potentially Exploiting MOVEit Zero Day

The DeepSeas cyber threat intelligence crew has observed exploitation of a zero-day exploit in US-based Progress’s MO…

Read More

Cyber Security Operations Expert: Meet Dorian James, DeepSeas

In this new issue of the series “Meet Our Deeps,” we introduce you to a DeepSeas cyber security operations exper…

Read More

How to have Productive Cyber Security Discussions with Board o…

Cyber security discussions with your Board of Directors may not be occurring enough or focusing too much on protectio…

Read More

Cloud to Firmware Exploitation Revealed by Otorio’s Rese…

The Cloud to Firmware exploitation revealed by Otorio’s Research can be viewed as a chain in the same way so ma…

Read More

Meet Security Operations Center Expert at DeepSeas, Timothy Carr

We had the pleasure of interviewing a Security Operations Center (SOC) expert at DeepSeas, Timothy Carr. In the inter…

Read More

DeepSeas and GreyCastle Security Partner to Offer a Comprehens…

San Diego, CA and Troy, NY – May 10, 2023 — Threat actors are collaborating to attack. It only makes sense for …

Read More

April 2023 Cyber Threat Intelligence Rollup by DeepSeas

Are you keeping a keen eye on the latest threat intel? The DeepSeas cyber threat intelligence crew published the Apri…

Read More

The DeepSeas are calling.
Book your virtual consult.

You pick the time and day. We’ll be ready to answer your questions.

Book with Calendly