August hit us with peak summertime sadness — heat waves, DEF CON hangovers, and a serious case of inbox neglect. The Dispatch took a little vacation, but we’re back now with fresh hunts, hot takes, and just enough chaos to shake off the sunscreen haze.
Ask-a-Thrunter: July 2025 Recap
The THOR Collective Dispatch July edition of Ask a Thrunter covers DEF CON plans, survival kit must-haves, and highlights on time charting in Splunk, proving pen test impact, and AI-powered hunting. Special guest Brett Schoenwald shares insights on his DEF CON debut as an artist, and the Hunt Clinic discusses AI agents in hunts and toxic threat hunting traits. For cybersecurity professionals, the episode provides valuable insights on preparing for DEF CON and improving threat hunting techniques.
By Lauren Proehl
My First DEFCON: A Noob’s Chronicle of Chaos, Coffee, and Crypto Stickers
Attending DEFCON as a cybersecurity professional involves long lines, networking opportunities, valuable insights, and a sense of community. Key takeaways include bringing cash for merch, wearing comfortable shoes, networking with others, staying hydrated, and making the most of the experience by exploring beyond the conference. Adaptability, collaboration, and curiosity are emphasized as essential skills in the cybersecurity field.
By Brett Schoenwald
The shift to autonomous AI-driven attacks requires threat hunters to focus on detecting behavioral anomalies and building context-aware detection logic. By pairing human intuition with intelligent systems, cybersecurity professionals can proactively defend against sophisticated adversaries in the "Quiet War." The key is to empower teams to think like adversaries and adapt quickly to evolving threats.
By Damien Lewke
Cybersecurity professionals should be aware of attackers leveraging help desk social engineering for MFA bypass, exploiting serverless functions for persistence in cloud environments, and targeting AI-powered development tools for supply chain attacks. Monitoring for anomalies, behavior patterns, and red flags in these areas is crucial for detecting and responding to sophisticated cyber threats.
By Lauren Proehl
Stay tuned for more thrunting wisdom next month.