Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
Ransomware

Gunra Ransomware Group Unveils Efficient Linux Variant

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics.

Latest News Jul 29, 2025

Save to Folio

Latest News Jul 29, 2025

Save to Folio

Prywatność i ryzyko

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.

How To Jul 28, 2025

Save to Folio

How To Jul 28, 2025

Save to Folio

APT i ataki ukierunkowane

Revisiting UNC3886 Tactics to Defend Against Present Risk

We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group.

Jul 28, 2025

Save to Folio

Jul 28, 2025

Save to Folio

Sztuczna inteligencja (AI)

Proactive Email Security: The Power of AI

Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision.

Research Jul 24, 2025

Save to Folio

Research Jul 24, 2025

Save to Folio

Złośliwe oprogramowanie

Back to Business: Lumma Stealer Returns with Stealthier Methods

Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.

Research Jul 22, 2025

Save to Folio

Research Jul 22, 2025

Save to Folio

Exploity i luki w zabezpieczeniach

Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)

CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse.

Research Jul 22, 2025

Save to Folio

Research Jul 22, 2025

Save to Folio

Chmura

CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security

This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards.

Expert Perspective Jul 16, 2025

Save to Folio

Expert Perspective Jul 16, 2025

Save to Folio

Sztuczna inteligencja (AI)

Preventing Zero-Click AI Threats: Insights from EchoLeak

A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging AI-native threat.

Jul 15, 2025

Save to Folio

Jul 15, 2025

Save to Folio

Ransomware

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defenses and speed up encryption across platforms.

Jul 07, 2025

Save to Folio

Jul 07, 2025

Save to Folio