From Dream Job to Malware: DreamLoaders in Lazarus’ Recent Campaign
During August 2025, Lab52 gained access to artifacts linked to Lazarus through DreamJob campaigns. Some of these artifacts and their
Read More03-01
During August 2025, Lab52 gained access to artifacts linked to Lazarus through DreamJob campaigns. Some of these artifacts and their
Read MoreIntroduction The pace of innovation hasn’t slowed in 2025, and neither have we! With three impactful releases already rolled out,
Read MoreKey findings Proofpoint created a new open-source tool for creating threat detection rules based on unique characteristics in PDFs called
Read MoreHere at ANY.RUN, we know how crucial threat intelligence is for ensuring strong cybersecurity, especially in organizations. This year, our
Read MoreMic-E-Mouse: a theoretical attack that could allow eavesdropping on conversations in a room through a computer mouse’s optical sensor.Kaspersky official
Read MoreOn September 25th, 2024, and on October 3rd, 2024, we received submissions through our Bug Bounty Program for Arbitrary Plugin
Read MoreExplore the latest trends, techniques, and procedures (TTPs) our incident response (IR) experts are actively facing with the TTP Briefing
Read MoreBy delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be.Trend
Read MoreTrend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can
Read MoreExpanded ITDR features—including the new Microsoft Defender for Identity sensor, now generally available—bring improved protection, correlation, and context to help
Read More