Aryaka Threat Research Lab

Blog Home > Featured Topic > Aryaka Threat Research Lab

Featured Topic: Aryaka Threat Research Lab

Kernel in the Crosshairs: The BlackSanta Threat Campaign Targeting Recruitment Workflows
The Resume that wasn’t a Resume It begins in one of the most trusted workflows inside any organization: hiring. An HR professional receives what appears to be a perfectly normal ...
Read Post >
Espionage Without Noise: Understanding APT36’s Enduring Campaigns
Critical infrastructure all over the world is under threat from highly organized, state-sponsored “espionage ecosystems”. These loosely knit but well-resourced organizations ar...
Read Post >
Phantoms in the Cloud: Fraudsters Exploit Google Cloud Storage for Deceptive Campaigns
It all began with a whisper—a few unassuming emails slipping into inboxes on an ordinary Tuesday morning. No bells, no whistles, nothing that would raise an eyebrow at first glan...
Read Post >
BatShadow: Vietnamese Threat Actor Expands Its Digital Operations
By Aditya K Sood | By Varadharajan K | Sept 25, 2025 Get the new Batshadow Threat Report or Explore Interactive Report Aryaka Threat Research Labs has identified a new campaign by ...
Read Post >
Vidar Malware is Back: New Aryaka Threat Research Report
Vidar, a well-known info-stealing malware, is making the rounds again with a few new tricks. In a new report, Aryaka’s Threat Research Lab dives into what’s happening and what ...
Read Post >
Wiley’s Internet Technology Letters Published Research on Generative AI for Adaptive Threat Hunting
Recently, we published a research piece in Wiley’s Internet Technology Letters on highlighting the importance of Generative (GenAI) for revolutionizing the adaptive threat huntin...
Read Post >
North Korea’s Kimsuky APT: A Stealthy Threat Adapting to the Evolving Digital World
By Aditya K Sood | By Varadharajan K | July 29, 2025 In today’s hyper-connected landscape, the traditional notion of a secure network perimeter is rapidly dissolving. State-s...
Read Post >
Fortifying Your Network: How Aryaka’s Unified SASE Shields Against Advanced Threats Like Remcos RAT
In the evolving landscape of cybersecurity, threats like Remcos RAT (Remote Access Trojan) have become increasingly sophisticated, leveraging stealthy techniques to infiltrate netw...
Read Post >
Advanced AI Security Research Released in Communications of the ACM Magazine
Our latest research on the challenges associated with malicious AI models has been published in the Communications of the ACM magazine, titled “Malicious AI Models Undermine Soft...
Read Post >
Remcos on the Wire: Analyzing Network Artifacts and C2 Command Structures
By Varadharajan K | By Bikash Dash | Jun 02, 2025 Overview   Remcos is a remote access trojan (RAT) that was first introduced in July 2016 by the German company Breaking Secur...
Read Post >
Advanced Security Research: The Paradigm of Hallucinations in AI-driven Cybersecurity Systems
Aryaka Threat Research Lab recently published an advanced AI research paper in the Elsevier Computer and Electrical Engineering (CAEE) journal highlighting the impacts of hallucina...
Read Post >
Strela Stealer Malware Research: Tracing the Digital Footprint and Network Behavior
Strela Stealer, a sophisticated information-stealing malware, is designed to exfiltrate sensitive user credentials, primarily targeting email and web browser data. This malware spr...
Read Post >