ICYMI: 2023-04-23Latest HeadlinesHacker Group Names Are Now Absurdly Out of Control20 Best Threat Hunting Tools – 2023What is Biometric Authentication? History, Types & How it Works?Threat Actors Using Mimikatz Hacking Tool to Deploy Trigona RansomwareHackers can breach networks using data on resold corporate routersDecoy Dog malware toolkit found after analyzing 70 billion DNS queries– MTZ