Vendors' News

Vendor announcements

  

Strategy for the Office Anywhere

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

  

The Oracle of Delphi Will Steal Your Credentials

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The

  

Threats Making WAVs – Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.

  

Keep Your Tech Flame Alive: Trailblazer Rachel Bayley

In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their

  

The Nansh0u Campaign ? Hackers Arsenal Grows Stronger

In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three

  

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead

  

Dell Business Client Update Catalog

Leading the way with ARM64 support.Blog | DellRead More

  

Dive into the Red Canary Security Data Lake

Red Canary now offers cost-efficient data storage that improves your security posture. Learn more about our new Security Data Lake

  

Upgrade Your PCs to Upgrade Security

Future-proof your PC fleet. The latest-gen commercial AI PCs are designed to keep you ahead of cyber adversaries.Blog | DellRead

  

Enhancing the Wordfence Bug Bounty Program: New Incentives & a Stronger Focus on High-Impact Research

Learn more about the incredible success of the Wordfence Bug Bounty Program, what we’re looking forward to in the future,

  

Announcing the Dell AI for Telecom Certification

Certify with Dell AI for Telecom—drive innovation, trust and impact. Lead the telecom AI revolution today!Blog | DellRead More

  

Banish bots from your Waiting Room and improve wait times for real users

Cloudflare Waiting Room is improving the user experience through the addition of Turnstile and Session Revocation, keeping wait times low

  

3rd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 3rd March, please download our Threat Intelligence Bulletin. TOP

  

How to safely convert files | Kaspersky official blog

How to change file format and not fall victim to cybercriminals.Kaspersky official blogRead More

  

Uncovering .NET Malware Obfuscated by Encryption and Virtualization

Malware authors use AES encryption and code virtualization to evade sandbox static analysis. We explore how this facilitates spread of

  

Mobile malware evolution in 2024

The most notable mobile threats of 2024, and statistics on Android-specific malware, adware and potentially unwanted software.SecurelistRead More

Latest

  

Strategy for the Office Anywhere

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

Strategy for the Office Anywhere

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

The Oracle of Delphi Will Steal Your Credentials

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The

Threats Making WAVs – Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.

Keep Your Tech Flame Alive: Trailblazer Rachel Bayley

In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their

The Nansh0u Campaign ? Hackers Arsenal Grows Stronger

In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three

  

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal

In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain

  

Agentic AI: Redefining the Future of Autonomy in Business

The evolution of artificial intelligence (AI) agents signals a profound transformation in how businesses operate. Unlike traditional AI models that

  

RIPE Atlas UI: Revamped Probe Detail Pages

Over the past few months, the RIPE Atlas team and our stakeholders have been hard at work reimagining the probe

  

Secure Your 5G Business Transformation

5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence. The post Secure

  

The Agentic AI Revolution: 5 Unexpected Security Challenges

As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents

  

Local Hosts for RIPE NCC Training Courses

For over two decades, the RIPE NCC has been delivering high-quality in-person training courses across our service region of 76

  

Google OAuth: abandoned domains attack | Kaspersky official blog

How attackers can target corporate services of defunct organizations using abandoned domains and a vulnerability in Google OAuth.Kaspersky official blogRead

  

Cloudflare’s 2024 Transparency Reports – now live with new data and a new format

Cloudflare’s 2024 Transparency Reports are now live — with new topics, new data points, and a new format, consistent with

  

The Good, the Bad and the Ugly in Cybersecurity – Week 9

Black Basta chat logs reveal threat intel, Termite ransomware leaks patient data on the dark web, and Ghostwriter targets Belarusian

  

RIPE NCC Hosted Training Courses

For over two decades, the RIPE NCC has been delivering high-quality in-person training courses across our service region of 76

  

Keeping connected, at a remote pediatric camp

Canada’s Brigadoon Village — a summer camp for children living with health and life challenges — gains critical networking support

  

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools

  

JavaGhost’s Persistent Phishing Attacks From the Cloud

Unit 42 reports on phishing activity linked to the threat group JavaGhost. These attacks target organizations’ AWS environments. The post

  

Attack and Defense in OT: Enhancing Cyber Resilience in Industrial Systems with Red Team Operations

In today’s rapidly evolving industrial landscape, securing Operational Technology (OT) is more critical than ever due to increased connectivity and

  

The SOC files: Chasing the web shell

Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing

  

Are Your VM Scans Testing the Entirety of the Network?

Many organizations have a vulnerability management (VM) problem without knowing it. Vulnerability management is a crucial component of any organization’s

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 17, 2025 to February 23, 2025)

📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to

  

Fighting the Real Enemy: The Importance of Responsible Vulnerability Disclosure Between Email Security Vendors

This blog explores an exploitation capability observed by Darktrace in another email security vendor’s link rewriting and the steps Darktrace

  

New Threat on the Prowl: Investigating Lynx Ransomware

Lynx ransomware, emerging in 2024, targets finance, architecture, and manufacturing sectors with phishing and double extortion. Read on for Darktrace’s

  

Some TXT about, and A PTR to, new DNS insights on Cloudflare Radar

The new Cloudflare Radar DNS page provides increased visibility into aggregate traffic and usage trends seen by our 1.1.1.1 resolverThe

  

Modern Approach to Attributing Hacktivist Groups

Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor

  

Healthcare AI Efficiency in the Spotlight at HIMSS25

Join Dell Technologies at the annual HIMSS event to see how healthcare is being transformed by modern, secure and innovative

  

Dell Expands AI for Telecom with AMD Solutions

Dell AI for Telecom expands offerings with AMD solutions after launching many successful solutions with NVIDIA and Intel.Blog | DellRead

  

Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations

We analyze the backdoor Squidoor, used by a suspected Chinese threat actor to steal sensitive information. This multi-platform backdoor is

  

NCC-IE Cyber Security Improvement Grant reopens offering €20-€60K for SME’S

The NCSC has reopened the NCC-IE Cyber Security Improvement Grant, offering between €20,000 and €60,000 in support for SMEs looking

  

How smartphones actually track you | Kaspersky official blog

Every time a mobile app displays an ad, your location and other data are shared with hundreds of companies. How

  

Prevent Stalkerware In Ex-Relationships | Avast

Leaving an abusive relationship is scary, hard — and complicated. Many survivors find that their lives are so intertwined with

  

How to scan huge file storage | Kaspersky official blog

A full list of the checks and settings needed to scan tens of terabytes of files for malware without disturbing

  

The ultimate cyber spring cleaning checklist

A cluttered digital space slows you down, adds stress, and can even make you more vulnerable to cyber threats. Who

  

The Open Telecom Transformation Program

The Open Telecom Transformation Program combines our telecom portfolio, transformation experience and partnerships to drive innovation.Blog | DellRead More

  

Polishing Ruby on Rails with RSpec metadata

RSpec metadata helps Red Canary’s engineers generate clean and consistent tests in our Ruby on Rails applicationRed CanaryRead More

  

Keep AI interactions secure and risk-free with Guardrails in AI Gateway

Deploy AI safely with built-in Guardrails in AI Gateway. Flag and block harmful or inappropriate content, protect personal data, and

  

PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A

What’s changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai?s solutions can

  

Modernizing industrial networks: The business case for IT/OT collaboration

Leaders are accelerating IT/OT partnerships for significant operational and financial benefits.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.htmlCisco Newsroom: SecurityRead More

  

RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector

Koi Stealer and RustDoor malware were used in a campaign linked to North Korea. This activity targeted crypto wallet owners.

  

Exploits and vulnerabilities in Q4 2024

This report provides statistics on vulnerabilities and exploits and discusses the most frequently exploited vulnerabilities in Q4 2024.SecurelistRead More

  

CIS Controls Version 8.1: What you need to know

The latest version of the CIS Controls was released in June 2024. The new version, 8.1, introduces some minor updates

  

Deceptive Signatures: Advanced Techniques in BEC Attacks

KEY TAKEAWAYS Sophistication of BEC Attacks: Business Email Compromise (BEC) attacks are becoming increasingly sophisticated, leveraging advanced social engineering, AI-driven

  

Securing tomorrow’s software: the need for memory safety standards

Posted by Alex Rebert, Security Foundations, Ben Laurie, Research, Murali Vijayaraghavan, Research and Alex Richardson, SiliconFor decades, memory safety vulnerabilities

  

How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation 

By: Dikla Barda, Roaman Zaikin & Oded Vanunu  On February 24, Check Point Blockchain Threat Intel System observed a sophisticated

  

Accelerating Cloud RAN Adoption with Nokia and Dell

Nokia and Dell collaborate in OTEL to transforming Cloud RAN adoption with innovative solutions and trusted partnerships.Blog | DellRead More

  

Making Cloudflare the best platform for building AI Agents

Today we’re excited to share a few announcements on how we’re making it even easier to build AI agents on

  

The Future of Edge AI Innovation

Dell is collaborating with Intel and Global System Integrators to bring optimized and verified Edge AI solutions on Dell PowerEdge

  

How to Achieve Compliance with NIS Directive

The original NIS Directive came into force in 2016 as the EU’s first comprehensive law governing cybersecurity in member states.

  

Key Updates in the OWASP Top 10 List for LLMs 2025

Last November, the Open Web Application Security Project (OWASP) released its Top Ten List for LLMs and Gen AI Applications

  

​​2025 Unit 42 Incident Response Report — Attacks Shift to Disruption

The 2025 Incident Response Report revealed that speed, sophistication and scale of attacks have reached unprecedented levels with AI-assisted threats.

  

How to set PCAP as default save file format in Wireshark

Did you know that there is a setting in Wireshark for changing the default save file format from pcapng to

  

Malicious code in fake GitHub repositories | Kaspersky official blog

Attackers are distributing malware through fake GitHub repositories as part of the GitVenom campaign.Kaspersky official blogRead More

  

Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities

File transfer applications are prime targets for ransomware groups due to their critical role in business operations. Recent vulnerabilities in

  

Auto-Color: An Emerging and Evasive Linux Backdoor

The new Linux malware named Auto-color uses advanced evasion tactics. Discovered by Unit 42, this article cover its installation, evasion

  

100,000 WordPress Sites Affected by Arbitrary File Upload, Read and Deletion Vulnerability in Everest Forms WordPress Plugin

100,000 WordPress Sites Affected by Arbitrary File Upload, Read and Deletion Vulnerability in Everest Forms WordPress Plugin The post 100,000

  

24th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 24h February, please download our Threat Intelligence Bulletin. TOP

  

Detecting and Containing Account Takeover with Darktrace

Account takeovers are rising with SaaS adoption. Learn how Darktrace detects deviations in user behavior and autonomously stops threats before

  

Security Roundup February 2025

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. The law’s long arm reaches

  

Powering Media & Entertainment with PowerScale and PowerEdge

Discover how PowerScale and PowerEdge transform Media & Entertainment by tackling data-intensive workflows seamlessly.Blog | DellRead More

  

Dell Collaborates with NVIDIA to Supercharge AI Efficiency

Accelerate AI with Dell and the NVIDIA Run:ai platform for scalable, efficient, and seamless AI infrastructure management.Blog | DellRead More

  

Palo Alto Networks Recognized as a Leader in Omdia Market Radar

Omdia report includes an evaluation of the OT security market, recommendations for choosing solutions, and analysis of OT cybersecurity platforms.

  

Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign

Highlights Introduction While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes

  

Auto-Woodpecker’s anniversary! | Kaspersky official blog

Eugene Kaspersky explains what is Auto-Woodpecker, and what does it have to do with AI.Kaspersky official blogRead More

  

Making Sense of Australia’s New Cybersecurity Legislation

Late last year, Australia’s Cyber Security Act 2024 received Royal Assent and became Law. It was a huge moment for

  

Protecting the Manufacturing Sector from Ransomware

The manufacturing sector has long been a favorite target for ransomware actors. However, the true scale of the issue has

  

The GitVenom campaign: cryptocurrency theft using GitHub

Kaspersky researchers discovered GitVenom campaign distributing stealers and open-source backdoors via fake GitHub projects.SecurelistRead More

  

The Bybit Incident: When Research Meets Reality

Research by Dikla Barda, Roman Ziakin and Oded Vanunu On February 21st, Check Point Blockchain Threat Intel System alerted on

  

Proofpoint Research: 2024 Account Takeover Statistics

Have you ever wondered what the most prevalent cyberattack type is? It is a hard question to answer. Attacks operate

  

CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda

Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes

  

The Good, the Bad and the Ugly in Cybersecurity – Week 8

Chrome and Mozilla release security fixes, latest Darcula PhaaS spoofs any brand, and GRU-linked actors exploit Signal feature for RCE.SentinelOneRead

  

What to do if your WhatsApp is hacked: a step-by-step guide | Kaspersky official blog

WhatsApp hack: what to do if hackers steal your WhatsApp account, or you want to protect it from hacking.Kaspersky official

  

Investigating LLM Jailbreaking of Popular Generative AI Web Products

We discuss vulnerabilities in popular GenAI web products to LLM jailbreaks. Single-turn strategies remain effective, but multi-turn approaches show greater

  

Angry Likho: Old beasts in a new forest

Kaspersky experts analyze the Angry Likho APT group’s attacks, which use obfuscated AutoIt scripts and the Lumma stealer for data

  

Actionable Threat Intelligence in Cybersecurity: A Comprehensive Guide

In an era where cyber threats evolve faster than ever, organizations need more than raw data—they need actionable threat intelligence.

  

Public-Private Collaboration Emerges as Key Theme from Paris AI Action Summit

AI’s future depends on public-private collaboration. At the AI Action Summit, leaders explored how partnerships drive innovation and Sovereign AI

  

The complete story of the 2024 ransomware attack on UnitedHealth

We assess the largest ransomware incident of 2024 — the attack on UnitedHealth, and its impact on the company and

  

Intelligence Insights: February 2025

Infrared Ibis infiltrates Chrome extensions and Saffron Starling surprises in this month’s edition of Intelligence InsightsRed CanaryRead More

  

Empowering AI-Driven Innovation with Windows Server 2025 and Dell PowerEdge Servers

Transform your IT for the future with Windows Server 2025 on Dell PowerEdge servers.Blog | DellRead More

  

Solving the Autopilot Motherboard Repair Challenge

Reducing Costs with Microsoft Windows Autopilot Microsoft Windows Autopilot is an innovative solution that reduces the cost of device provisioning …Blog

  

The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions

Executive Summary Why We Care about Sandbox Emulation As a discipline, information security involves a vast web of entry vectors,

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 10, 2025 to February 16 2025)

📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to

  

Introducing the New RIPEstat UI

The RIPE NCC will soon launch a new version of the RIPEstat UI built on the original 2013 version, but

  

Cisco and BT Group: A partnership fit for future challenges

The telco world is under pressure. But working hand in hand with Cisco, BT Group is AI ready and more

  

Cybersecurity for Electricity Distribution [2025 Update]

Electricity transmission and distribution are popular topics at the moment, especially as they pertain to utilities infrastructure security. These essential

  

Stately Taurus Activity in Southeast Asia Links to Bookworm Malware

Unit 42 details the just-discovered connection between threat group Stately Taurus (aka Mustang Panda) and the malware Bookworm, found during

  

Updated Shadowpad Malware Leads to Ransomware Deployment

In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy

  

Managed detection and response in 2024

The Kaspersky Managed Detection and Response report includes trends and statistics based on incidents identified and mitigated by Kaspersky’s SOC

  

MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security

Palo Alto Networks achieves top MITRE ATT&CK 2024 results with 100% detection rates against evolving AI-powered cyber threats. The post

  

Deepfake Reality: My Experience as a Target

Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to

  

Phishing Tests: Are We Doing This Right?

Phishing tests are a common cybersecurity practice, but do they truly prepare employees for real-world threats? In some cases, these

  

Reimagining Technology with Simplicity at Its Core

How Dell is making it easier than ever to find the right AI PC.Blog | DellRead More

  

Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit

Unit 42 researchers detail nine vulnerabilities discovered in NVIDIA’s CUDA-based toolkit. The affected utilities help analyze cubin (binary) files. The

  

Darktrace Releases Annual 2024 Threat Insights

Explore Darktrace’s Annual Threat Report 2024 for insights on the latest cyber threats and trends observed throughout the year.Darktrace BlogRead

  

Malaysia’s Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

In December 2024, Malaysia passed its Data Sharing Bill 2024, a new piece of legislation aimed at streamlining data-sharing across

  

CIS Control 01: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement leading up to what we are

  

Spam and phishing in 2024

We analyze 2024’s key spam and phishing statistics and trends: the hunt for crypto wallets, Hamster Kombat, online promotions via

  

XMRig miner attacks corporate users | Kaspersky official blog

The XMRig cryptominer is spreading through trojanized versions of sim games on torrents.Kaspersky official blogRead More

  

Curb Healthcare Costs — Can Cybersecurity Platformization Help?

A platformized approach to cybersecurity can help organizations navigate challenges while strengthening resilience, boosting efficiency and managing costs. The post