Desde que nosso fundador, Nir Zuk, cunhou pela primeira vez o termo “detecção e resposta estendida”, há quase seis anos, temos a missão de fazer do XDR a base das operações de segurança modernas. As equipes de operações de segurança desempenham um papel vital na proteção de suas organizações contra ameaças virtuais, mas muitas f...
Desde que nosso fundador, Nir Zuk, cunhou pela primeira vez o termo “detecção e resposta estendida”, há quase seis anos, temos a missão de fazer do XDR a base das operações de segu...
Unit 42 researchers discovered BOLA vulnerability CVE-2024-22278 in the cloud-native container registry Harbor. They break down its discovery and the outcomes....
A direct correlation between GenAI’s explosive popularity and scam attacks is addressed in this article, using plentiful data and a case study of network abus...
We explain how an automated BOLA detection tool harnessing GenAI discovered multiple BOLA vulnerabilities in open-source scheduling tool Easy!Appointments....
Malware analysts demonstrate how to triage and analyze large amounts of samples with greater efficiency. Samples include Remcos RAT, Lumma Stealer and more....
This article is a detailed study of CVE-2023-46229 and CVE-2023-44467, two vulnerabilities discovered by our researchers affecting generative AI framework LangC...
Ransomware gang RA World rebranded from RA Group. We discuss their updated tactics from leak site changes to an analysis of their operational tools. ...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts