The field of cybersecurity is moving towards more proactive and visual approaches to threat hunting and intelligence gathering. This is evident in the development of new tools and frameworks that enable security analysts to identify, analyze, and respond to threats more effectively. The use of artificial intelligence, machine learning, and data visualization is becoming increasingly prevalent in cybersecurity research. Additionally, there is a growing focus on digital sovereignty and the need for organizations to protect their sensitive assets against unauthorized access and cyber threats. Noteworthy papers in this area include: A Cyber-Twin Based Honeypot for Gathering Threat Intelligence, which presents a novel approach to gathering threat intelligence using a cyber twin of a water treatment plant. Bridging Threat Models and Detections: Formal Verification via CADP, which introduces a formal verification framework for threat detection systems. Digital Sovereignty Control Framework for Military AI-based Cyber Security, which proposes a framework for ensuring digital sovereignty in military organizations.