Have you heard about Cyber_AI?In conjunction with _secpro, the Packt cyber_ai newsletter is our sister publication that gives you insights into deep research, cutting-edge developments, and controversial news in that confusing and still largely misunderstood overlap in cybersecurity and artificial intelligence. Every week, we publish a newsletter that helps you get down to the most important details in a sea of AI-generated, security-compromising noise. Sound good? Join us by following the link below. Welcome to another _secpro! The conflict surrounding Iran illustrates how contemporary cyber operations function as an extension of geopolitical competition rather than a separate domain of warfare. State-linked actors, proxy groups, and opportunistic cybercriminals all exploit the disruption and political polarisation created by armed conflict to conduct espionage, influence operations, and disruptive attacks. Techniques such as distributed denial-of-service campaigns, wiper malware, credential-harvesting phishing, and information manipulation are used not only to target military or government networks but also to pressure civilian infrastructure, financial institutions, and private companies that sit within the broader strategic ecosystem. As the conflict evolves, these tactics demonstrate how cyber capabilities can be rapidly mobilized, scaled through proxy actors, and directed against a wide range of targets—creating a threat landscape in which the effects of war extend well beyond the battlefield and into the digital systems that underpin modern economies and societies. If you want more, you know what you need to do: sign up to the premium and get access to everything we have on offer. Click the link above to visit our Substack and sign up there! Cheers! Your SOC is a queueing system. It behaves like one, tooMost SOC improvement work focuses on what happens after an investigation starts. Faster playbooks, better context, tighter workflows. All useful. But for a lot of teams, the bigger problem is what happens before anyone even looks at the alert. Alerts come in. Analysts triage and escalate. When the arrival rate exceed |