Research
- January 20, 2022We analyze some existing and developing threats that target NAS devices of users and businesses.November 10, 2021Our research paper takes a close look at the cybermercenary group Void Balaur's services, activities, and targets.September 02, 2021As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.September 02, 2021As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.August 24, 2021Our research provides a detailed analysis of the new tools and techniques used by Earth Baku in its cyberespionage campaign against organizations in the Indo-Pacific region.July 20, 2021Our research sheds light on the tools and techniques used by TeamTNT and the potential impact of the group’s sundry malicious activities.July 13, 2021Our two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.June 30, 2021ICS endpoint security has become more important as the interconnection between IT and OT continues to grow. Our research shares the status of global industrial systems in terms of security against both known and new threats that hound ICS endpoints.