[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$frX47yl8Ca8DV-1xcNewIPRvbb9qSQ0cQgdVF_bdF_VI":3},{"items":4,"nextOffset":90,"hasMore":61},[5,23,38,49,64,77],{"id":6,"title":7,"description":8,"image_url":9,"url":10,"content_type":11,"category":12,"tags":13,"status":19,"featured":20,"created_at":21,"published_at":22},"eb8cfd01-7b79-4087-b6f2-8b462d14885e","ThreatNoir Threat Hunt Campaign","A cybersecurity threat hunting campaign by ThreatNoir targeting five distinct threat actors (Volt Typhoon, Midnight Blizzard, Salt Typhoon, and BlackCat) with emphasis on identifying malicious infrastructure disguised as legitimate systems. The campaign promotes proactive threat detection and investigation methodologies.","https:\u002F\u002Fzbqafrnxsxwbarztrtqp.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fresources\u002Fuploads\u002Fffdc7679-d035-4e92-a718-f2d49311a041.png",null,"poster","Threat Intel",[14,15,16,17,18],"threat-hunting","apt-groups","threat-actors","incident-response","cyber-threats","published",true,"2026-04-04T06:57:15.941125+00:00","2026-04-04T06:57:15.508+00:00",{"id":24,"title":25,"description":26,"image_url":27,"url":28,"content_type":29,"category":30,"tags":31,"status":19,"featured":20,"created_at":37,"published_at":10},"c2463696-3878-412e-b950-1f568fd93fbf","ISO\u002FIEC 27001:2022 Practical Guide for SMEs","Free handbook from ISO covering how to implement an Information Security Management System (ISMS) in small and mid-size enterprises. Includes clause-by-clause guidance, risk assessment templates, case studies, and certification FAQ. Published 2024.","\u002Fimages\u002Fcategory-policy.png","https:\u002F\u002Fwww.iso.org\u002Fpublication\u002FPUB100484.html","guide","frameworks",[32,33,34,35,36],"iso-27001","compliance","sme","isms","risk-management","2026-04-04T13:27:25.291234+00:00",{"id":39,"title":40,"description":41,"image_url":42,"url":10,"content_type":43,"category":30,"tags":44,"status":19,"featured":20,"created_at":48,"published_at":10},"2508431e-b388-48f7-bdd6-191f85fc3e51","MITRE ATLAS: The ATT&CK Framework for AI Systems","Visual reference card covering all 16 ATLAS tactics, 85+ techniques, and key AI-specific attack methods. ATLAS maps how adversaries target ML models, data pipelines, and AI infrastructure. Includes the two AI-unique tactics (AI Model Access and AI Attack Staging) and 8 critical technique categories.","\u002Fimages\u002Fmitre-atlas-infographic.png","infographic",[45,46,47],"ai-security","threat-modeling","mitre","2026-04-04T07:55:58.17546+00:00",{"id":50,"title":51,"description":52,"image_url":53,"url":10,"content_type":11,"category":54,"tags":55,"status":19,"featured":61,"created_at":62,"published_at":63},"8e43216e-33e8-4b72-b20f-3b34705e9b98","background","A dark-themed security operations and threat intelligence platform featuring a geometric shield emblem with integrated monitoring capabilities. The design suggests enterprise-grade security analytics and threat detection systems.","https:\u002F\u002Fzbqafrnxsxwbarztrtqp.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fresources\u002Fuploads\u002Fbfe9824e-201e-421c-b2be-2615dd8376f8.png","Cloud Security",[56,57,58,59,60],"threat intelligence","security operations","dark web monitoring","cyber threat","enterprise security",false,"2026-04-04T07:06:23.123931+00:00","2026-04-04T07:06:22.603+00:00",{"id":65,"title":66,"description":67,"image_url":68,"url":10,"content_type":11,"category":69,"tags":70,"status":19,"featured":61,"created_at":75,"published_at":76},"1516c014-1cde-40e9-bf5e-b1920f6d3b4a","Risk & Audit KPIs Dashboard for Enterprise Risk Management","A comprehensive framework for tracking Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) across 12 critical areas of enterprise risk management and internal audit functions. It measures the effectiveness of risk governance, identification, assessment, mitigation, controls, incident management, audit planning, regulatory compliance, IT\u002Foperational risk, business continuity, and risk reporting.","https:\u002F\u002Fzbqafrnxsxwbarztrtqp.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fresources\u002Fuploads\u002F01c249b9-b32c-4186-8ebe-5a414c614c49.png","Compliance",[71,72,73,74,33],"risk management","audit","kpi tracking","governance","2026-03-29T20:17:03.410003+00:00","2026-03-29T20:17:03.286+00:00",{"id":78,"title":79,"description":80,"image_url":81,"url":10,"content_type":11,"category":82,"tags":83,"status":19,"featured":61,"created_at":88,"published_at":89},"9913eea0-f2b6-46b0-b0e3-22d308c5fb1c","AI-Security: 10 Must-Know Concepts","A comprehensive guide covering ten critical AI security concepts including training data poisoning, prompt injection, shadow AI, jailbreaking, and encryption practices. This resource outlines key vulnerabilities and protective measures essential for securing AI systems in enterprise environments.","https:\u002F\u002Fzbqafrnxsxwbarztrtqp.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fresources\u002Fuploads\u002F308092a7-5e33-44b3-97ef-e9e29adfaf2d.png","AI Security",[45,84,85,86,87],"threat-prevention","data-protection","ai-vulnerabilities","security-best-practices","2026-03-29T15:05:28.788173+00:00","2026-03-29T15:06:58.22511+00:00",6]