Blog
Your Threat Hunters Are Spending Their Day Reading Blogs. Here’s How to Fix That.
By Yury Sergeev and Juanita Koschier, RST Cloud Picture your best threat hunter. They came up through incident response, they think like an adversary, and they know your environment better than anyone. Now picture what they actually spent the first two hours of their day doing: reading threat reports, skimming vendor blogs, manually checking whether any of it is…
C2 Tracking Approaches: From Search Engines to Managed Feeds
Command and Control (C2) infrastructure tracking is a cornerstone of modern cyber threat intelligence (CTI). By identifying and monitoring attacker-controlled servers, defenders can block malicious communications, detect intrusions earlier, and ultimately reduce the dwell time of threats within their environments. With so many platforms and techniques available, each offering unique strengths, how can CTI teams,…
Combating Credential Stuffing, Bots & Abuse in Online Gaming
The gaming industry today faces increasingly complex cybersecurity threats, including credential stuffing, bot-driven cheating, in-game economy manipulation, and DDoS attacks. In this article, we focus specifically on threats targeting online web services and infrastructure. In collaboration with Peakhour, a leading platform in credential stuffing, bot mitigation, and behavioural detection, RST Cloud offers a joint solution that…


