Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks
Ransomware

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks

Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies.

August 14, 2025
Conformità e rischi

Trend Vision One Integrates Microsoft Defender for Endpoint

Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to unify visibility, close security gaps, and accelerate risk mitigation - maximizing protection without replacing existing tools.

Security Strategies Aug 26, 2025

Save to Folio

Security Strategies Aug 26, 2025

Save to Folio

Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments.

Research Aug 20, 2025

Save to Folio

Research Aug 20, 2025

Save to Folio

Ransomware

Gunra Ransomware Group Unveils Efficient Linux Variant

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics.

Latest News Jul 29, 2025

Save to Folio

Latest News Jul 29, 2025

Save to Folio

Rischi di Privacy

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.

How To Jul 28, 2025

Save to Folio

How To Jul 28, 2025

Save to Folio

APT & attacchi mirati

Revisiting UNC3886 Tactics to Defend Against Present Risk

We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group.

Jul 28, 2025

Save to Folio

Jul 28, 2025

Save to Folio