Listen on Apple Podcasts Listen on SpotifyListen on Google Podcasts
Security Posture Rating
NEWMeasure cybersecurity maturity and get clear, actionable insights that expose gaps, prioritize improvements, and demonstrate real progress.
Managed Detection and Response
NEW24/7 SOC combined with contextual intelligence, patented detection logic, and AI-enhanced alerts for rapid threat detection and response
Asset Inventory
NEWComplete visibility across your organization’s attack surface.
Vulnerability Management
NEWIdentify vulnerabilities and prioritizes which ones truly matter within your organization’s context
Cloud Posture
NEWPersistent monitoring, drift detection, and alignment with cloud security best practices to close security gaps
Application Control
NEWExpert currated list of application block rules to simplify management and customize application protection
LogIC (Streamlined SIEM)
NEWHyper-efficient, real-time event collection and automated mapping
Tenant Administrator
NEWIdentify at-risk tenants, track billing and renewals, and instantly act on time-sensitive security issues
Integrations
NEWVisibility Across Attack Surface
NEWComprehensive visibility across client environment through a unified, contextual view that enables quicker actions, lowers risk, and delivers measurable results.
Prioritize What Matters
NEWCorrelate vulnerabilities, misconfigurations, and threat activity to determine which issues pose the greatest risk
Secure Cloud Identities
NEWProtect your cloud identities from attacks due to misconfigurations, policy drift, excessive permissions, and credential theft
Scale Security Operations
NEWStreamline the entire security lifecycle from asset discovery to threat response with automation, contextual insights, and enhanced efficiency
Meet Compliance Requirements
NEWSimplified logging and compliance with push button deployment and real-time reporting
Improve Cybersecurity Maturity
NEWAssess, monitor, and improve cybersecurity maturity with real-time insights and guided, prescriptive actions
Unified Security Posture
NEWCompassOne Platform
NEWSecurity Operations Center
NEWDedicated threat hunters and remediators, on call 24/7/365, with unparalleled cybersecurity expertise
Adversary Pursuit Group
NEWThis elite team is armed with real-time threat intel, delivering rapid response and unmatched protection.
Managed EDR
NEWUsing our patented technology and arming our 24/7/365 MDR with context to resolve threats faster.
Cloud MDR
NEWExpert security monitoring & rapid, context-driven response for your cloud environments.
In this week’s episode, Jon Murchison, founder and CEO, is joined by David Rushmer, Director of Threat Research, and Xavier Salinas, VP of Threat Operations, to discuss the state-sponsored threat, HAFNIUM, identified by Microsoft. They dive deeper into HAFNIUM’s tradecraft, tactics, and unique characteristics. Rushmer additionally expands on his experience in the threat research and intelligence space, sharing advice for budding security professionals.
With hacker groups constantly advancing their tradecraft efforts, an around-the-clock true Managed Detection and Response service is necessary. Detection and response times often determine whether threat actors, like HAFNIUM, succeed in their efforts, or not. At Blackpoint, we understand the importance of using your resources and staying curious. Learn more about the threat group, as well as our real-world threat expertise, in this week’s episode.
Blackpoint Cyber does the fighting for you, but ever wish you could get closer to the action? Hear all the details firsthand at our podcast, The Unfair Fight. Listen to monthly episodes where Founder & CEO, Jon Murchison, VP of Threat Operations, Xavier Salinas, and Director of Threat Research, David Rushmer, get real and talk all things cybersecurity and more.
Tune in now or check out our other episodes!
Don’t let a lack of awareness leave the organizations you protect vulnerable to sophisticated and elusive attacks. Subscribe now for a weekly roundup of Blackpoint’s empowering articles.
Subscribe now!