Tuesdays at 1pm ET• Resources • Webinars
SecOps Weekly
Join Red Canary’s security experts and industry influencers for a weekly broadcast that dissects the latest cybersecurity news, emerging threats, and practical detection guidance.
What you’ll take away:
🔥 Fresh, unfiltered insights directly from Red Canary’s Intel and Threat Hunting teams.
🔥 Real-world security strategies that work.
EXCLUSIVE INSIGHTS
Tuesdays @ 1pm ET (30 mins.)
Virtual
Join Red Canary’s security experts and industry influencers for a weekly broadcast that dissects the latest cybersecurity news, emerging threats, and practical detection guidance.
What you’ll take away:
🔥 Fresh, unfiltered insights directly from Red Canary’s Intel and Threat Hunting teams.
🔥 Real-world security strategies that work.
What you’ll take away:
🔥 Fresh insights from Red Canary’s Intel and Threat Hunting teams—straight from the front lines
🔥 Unfiltered takes on the biggest cybersecurity news and trends shaking up the industry
🔥 Real-world security strategies that work
Inside the 2026 Threat Detection Report: A three-part miniseries
The 2026 Threat Detection Report is almost here! Join us for a three-part miniseries designed to help defenders and decision makers gain a strategic and tactical advantage over modern adversaries. Get a look at the latest shifts in cybercrime—including a surge in identity-based attacks, how to operationalize this intelligence to test and harden your organization’s security controls against today’s threats, and how adversary tradecraft has changed over the last year.

Defenders on Defenders
Join Red Canary's Senior Intelligence Analyst Stef Rand and Senior Malware Analyst Tony Lambert for an insightful discussion on findings from the 2026 Threat Detection Report! Stef and Tony will break down three practitioner takeaways to help organizations move from theory to practical defense, including how adversaries are increasingly leveraging Node.js to build malware like JustAskJacky and Tampered Chef, misusing legitimate system binaries (LOLbins and LOLBAS), and why DLL sideloading remains a universal struggle for defenders.
Read More

