Your Threat Hunters Are Spending Their Day Reading Blogs. Here’s How to Fix That. 

By Yury Sergeev and Juanita Koschier, RST Cloud  Picture your best threat hunter. They came up through incident response, they think like an adversary, and they know your environment better than anyone. Now picture what they actually spent the first two hours of their day doing: reading threat reports, skimming vendor blogs, manually checking whether any of it is…

C2 Threat Persistence Statistics First Half of 2025

C2 Tracking Approaches: From Search Engines to Managed Feeds

Command and Control (C2) infrastructure tracking is a cornerstone of modern cyber threat intelligence (CTI). By identifying and monitoring attacker-controlled servers, defenders can block malicious communications, detect intrusions earlier, and ultimately reduce the dwell time of threats within their environments. With so many platforms and techniques available, each offering unique strengths, how can CTI teams,…

gamer hacker pic

Combating Credential Stuffing, Bots & Abuse in Online Gaming

The gaming industry today faces increasingly complex cybersecurity threats, including credential stuffing, bot-driven cheating, in-game economy manipulation, and DDoS attacks. In this article, we focus specifically on threats targeting online web services and infrastructure. In collaboration with Peakhour, a leading platform in credential stuffing, bot mitigation, and behavioural detection, RST Cloud offers a joint solution that…