Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

News & Blogs

Keeping you informed

RECENT BLOGS

The Unfriending Truth: How to Spot a Facebook Phishing Scam Before It's Too Late

The Unfriending Truth: How to Spot a Facebook Phishing Scam Before It's Too Late

In the second half of 2025, Trellix observed a surge in credential-stealing Facebook phishing scams, particularly those using the sophisticated "Browser in the Browser" (BitB) technique to trick users with fake login pop-ups.

Read the Blog

The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics

The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics

Trellix provides an in-depth analysis of CrazyHunter ransomware and its attack flow, which has emerged as a significant and concerning threat.

Read the Blog

Amadey Exploiting Self-Hosted GitLab to Distribute StealC

Amadey Exploiting Self-Hosted GitLab to Distribute StealC

Discover how Amadey loader abuses compromised self-hosted GitLab infrastructure to distribute StealC infostealer, evading security controls through trusted platforms.

Read the Blog

The Fake Domain Controller You Didn’t See Coming: Detecting DCShadow Attacks Using Trellix NDR

The Fake Domain Controller You Didn’t See Coming: Detecting DCShadow Attacks Using Trellix NDR

Understanding how DCShadow works and how to detect it is critical for protecting your identity infrastructure, whether you're a SOC analyst, Active Directory administrator, or member of a red team or incident response function.

Read the Blog

5 Ways Trellix NDR 4.1 Advances the SOC

5 Ways Trellix NDR 4.1 Advances the SOC

New Trellix NDR 4.1 delivers speed and unified security with no-code hyperautomation, IT/OT convergence, and AI-based detections that work on-prem/air-gapped.

Read the Blog

Get the latest

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Please enter a valid email address.

Zero spam. Unsubscribe at any time.