The Resume that wasn’t a Resume It begins in one of the most trusted workflows inside any organization: hiring. An HR professional receives what appears to be a perfectly normal ...
Critical infrastructure all over the world is under threat from highly organized, state-sponsored “espionage ecosystems”. These loosely knit but well-resourced organizations ar...
It all began with a whisper—a few unassuming emails slipping into inboxes on an ordinary Tuesday morning. No bells, no whistles, nothing that would raise an eyebrow at first glan...
By Aditya K Sood | By Varadharajan K | Sept 25, 2025 Get the new Batshadow Threat Report or Explore Interactive Report Aryaka Threat Research Labs has identified a new campaign by ...
Vidar, a well-known info-stealing malware, is making the rounds again with a few new tricks. In a new report, Aryaka’s Threat Research Lab dives into what’s happening and what ...
Recently, we published a research piece in Wiley’s Internet Technology Letters on highlighting the importance of Generative (GenAI) for revolutionizing the adaptive threat huntin...
By Aditya K Sood | By Varadharajan K | July 29, 2025 In today’s hyper-connected landscape, the traditional notion of a secure network perimeter is rapidly dissolving. State-s...
In the evolving landscape of cybersecurity, threats like Remcos RAT (Remote Access Trojan) have become increasingly sophisticated, leveraging stealthy techniques to infiltrate netw...
Our latest research on the challenges associated with malicious AI models has been published in the Communications of the ACM magazine, titled “Malicious AI Models Undermine Soft...
By Varadharajan K | By Bikash Dash | Jun 02, 2025 Overview Remcos is a remote access trojan (RAT) that was first introduced in July 2016 by the German company Breaking Secur...
Aryaka Threat Research Lab recently published an advanced AI research paper in the Elsevier Computer and Electrical Engineering (CAEE) journal highlighting the impacts of hallucina...
Strela Stealer, a sophisticated information-stealing malware, is designed to exfiltrate sensitive user credentials, primarily targeting email and web browser data. This malware spr...