Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

News & Blogs

Keeping you informed

RECENT BLOG POSTS

PureRAT: A Multi-Stage, Fileless RAT Utilizing Image Steganography and Process Hollowing
PureRAT: A Multi-Stage, Fileless RAT Utilizing Image Steganography and Process Hollowing

PureRAT is an advanced Remote Access Trojan (RAT) characterized by its complex infection stages. The intrusion sequence is initiated by a malicious .LNK file that triggers a concealed PowerShell command to retrieve a heavily obfuscated VBS loader.

Read the Blog

DCSync Detection Without Signatures: Trellix NDR and the Power of Technique-Based Defense
DCSync Detection Without Signatures: Trellix NDR and the Power of Technique-Based Defense

This blog explores how Trellix Network Detection and Response (NDR) moves beyond static signatures to detect these attempts by focusing on the underlying behavioral patterns of the attack technique itself.

Read the Blog

A CISO’s Compliance Playbook:  Navigating the Complexity of NIS2, DORA, and CRA
A CISO’s Compliance Playbook: Navigating the Complexity of NIS2, DORA, and CRA

Guide for CISOs: Master the EU's NIS2, DORA, and CRA cyber regulations to boost cyber resilience and enforce continuous risk management.

Read the Blog

How A Simple Misconfiguration Can Fuel Offline Attacker Tools
How A Simple Misconfiguration Can Fuel Offline Attacker Tools

In this blog, our researchers describe how a single script allows a compromise without authentication credentials.

Read the Blog

Preparing for the AI Tidal Wave: Securing Critical Enterprise Data
Preparing for the AI Tidal Wave: Securing Critical Enterprise Data

The AI data risk tipping point has arrived. Learn how to transform AI from a potential data risk into a secure productivity engine.

Read the Blog

Get the latest

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Please enter a valid email address.

Zero spam. Unsubscribe at any time.