Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

Blogs

The latest cybersecurity trends, best practices, security vulnerabilities, and more

RECENT STORIES

Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial
 Execution and Defense Evasion

Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion

How an info stealing campaign used legitimate Cisco Webex’s binaries for initial execution and defense evasion, and how Trellix EDR detected it.

Read More

Using EDR to Uncover an Info-Stealing Campaign that Used Legitimate Binaries

Using EDR to Uncover an Info-Stealing Campaign that Used Legitimate Binaries

How Trellix EDR found what others couldn't: an information stealing campaign inside illegitimate versions of Cisco Webex.

Read More

Trellix Data Loss Prevention Integration with Chrome Enterprise Delivers Secure Browsing Protection

Trellix Data Loss Prevention Integration with Chrome Enterprise Delivers Secure Browsing Protection

Learn how Trellix Data Loss Prevention for Chrome Enterprise protects against data leaks and delivers secure browsing protections through a seamless integration.

Read More

Pouring Acid Rain

Pouring Acid Rain

The AcidRain and AcidPour wipers have been widely reported, and often said to overlap in code, but do they really? And if so, how?

Read More

Trellix Wise Hyper Automates EDR with Generative AI

Trellix Wise Hyper Automates EDR with Generative AI

Trellix introduces GenAI for EDR so analysts can hunt, investigate, and remediate faster.

Read More

Get the latest

We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.

Please enter a valid email address.

Zero spam. Unsubscribe at any time.