Desde que nosso fundador, Nir Zuk, cunhou pela primeira vez o termo “detecção e resposta estendida”, há quase seis anos, temos a missão de fazer do XDR a base das operações de segurança modernas. As equipes de operações de segurança desempenham um papel vital na proteção de suas organizações contra ameaças virtuais, mas muitas f...
Desde que nosso fundador, Nir Zuk, cunhou pela primeira vez o termo “detecção e resposta estendida”, há quase seis anos, temos a missão de fazer do XDR a base das operações de segu...
We track a campaign by Gleaming Pisces (Citrine Sleet) delivering Linux or macOS backdoors via Python packages, aiming to infiltrate supply chain vendors....
We detail a rare phishing mechanism using a refresh entry in the HTTP response header for stealth redirects to malicious pages, affecting finance and government...
Repellent Scorpius distributes Cicada3301 ransomware, using double extortion and targeting global victims since May 2024. We break down their toolset and more....
A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage....
A technical analysis of deepfake technology uncovers how cybercriminals utilize AI-generated videos of public figures to execute sophisticated scams....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts