Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
img

Intelligenz, um Cyber-Bedrohungen einen Schritt voraus zu sein

Cyber-Bedrohungen entwickeln sich schnell weiter – und Aryaka auch. Das Aryaka Threat Research Lab unter der Leitung von Aditya K. Sood, Ph.D., liefert Bedrohungsdaten und Forschungsergebnisse, die Unternehmen dabei helfen, aufkommende Risiken proaktiv zu erkennen, abzumildern und zu verteidigen.
Unter der Leitung von Aditya K. Sood, Ph.D., treibt das Aryaka Threat Research Lab Innovationen voran, indem es fortschrittliche Erkenntnisse über Bedrohungen in die Unified SASE as a Service-Plattform von Aryaka einspeist.

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

BatShadow: Vietnamesischer Bedrohungsakteur weitet seine digitalen Aktivitäten aus

Von Aditya K Sood | Von Varadharajan K | 25. September 2025 Holen Sie sich den neuen Batshadow-Bedrohungsbericht oder hören…

Read Blog

Wiley’s Internet Technology Letters veröffentlicht Forschung über generative KI für adaptive Bedrohungsjagd

Kürzlich haben wir einen Forschungsbeitrag in den Internet Technology Letters von Wiley veröffentlicht , in dem wir die Bedeutung von…

Read Blog

Nordkoreas Kimsuky APT: Eine heimliche Bedrohung, die sich an die sich entwickelnde digitale Welt anpasst

Von Aditya K Sood | Von Varadharajan K | 29. Juli 2025 In der heutigen hypervernetzten Landschaft löst sich die…

Read Blog

Verstärken Sie Ihr Netzwerk: Wie Aryakas Unified SASE Sie vor fortgeschrittenen Bedrohungen wie Remcos RAT schützt

In der sich entwickelnden Landschaft der Cybersicherheit sind Bedrohungen wie Remcos RAT (Remote Access Trojan) immer raffinierter geworden. Sie nutzen…

Read Blog

Fortschrittliche KI-Sicherheitsforschung in der Zeitschrift Communications of the ACM veröffentlicht

Unsere neuesten Forschungsergebnisse zu den Herausforderungen im Zusammenhang mit bösartigen KI-Modellen wurden in der Zeitschrift Communications of the ACM unter…

Read Blog

Remcos on the Wire: Analyse von Netzwerk-Artefakten und C2-Kommandostrukturen

Von Varadharajan K | Von Bikash Dash | Juni 02, 2025 Übersicht Remcos ist ein Fernzugriffstrojaner (RAT), der erstmals im…

Read Blog

Snake Infostealer: Ein Blick auf die Datenexfiltration über SMTP

Die Datenexfiltration über das Simple Mail Transfer Protocol (SMTP) ist eine robuste Methode, mit der Angreifer sensible oder vertrauliche Informationen…

Read Blog

Wir stellen vor: Aryaka Threat Research Lab

Die Bedrohungen für die Cybersicherheit entwickeln sich in einem noch nie dagewesenen Tempo und setzen Unternehmen einem ständigen Risiko aus.…

Read Blog

SaltTyphoon APT: Unified SASE als Dienst zur Rettung

Übersicht Ereignisse wie SaltTyphoon sind eine hervorragende Erinnerung an die Anfälligkeit von Unternehmen und Anwendern für Sicherheitsverletzungen aufgrund von Abhängigkeiten…

Read Blog

Unterbrechung der Angriffsfläche mit Unified SASE as a Service durch Abschreckung von bösartiger Kommunikation

Resiliente Cybersicherheit ist ein strategischer Ansatz, der die Fähigkeit einer Organisation betont, Cyber-Bedrohungen und -Angriffen zu widerstehen, sich an sie…

Read Blog
report

Von der Aufklärung zur Kontrolle

Die operative Blaupause der Kimusky APT für Cyberspionage

View Report
Resource Page Thumbnail

Aryaka Bedrohungsforschungslabor

Unterbrechung der Angriffsfläche mit Unified SASE as a Service durch Abschreckung von bösartiger Kommunikation

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‚Vampire Bot‘ Malware to Hunt Job Seekers

A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive…

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Vidar infostealer is badder than…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to…

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals have been utilizing the Vidar information stealer in attacks this year due to the malware’s low barrier of…

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report released today by secure access service edge provider Aryaka Networks Inc. is warning of the growing threat…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and behavior-aware approach to detection can significantly improve security outcomes.

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant Dior has confirmed a data breach after experiencing a cyber attack that resulted in unauthorized access to…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware attack has struck Kettering Health, a nonprofit network operating 14 medical centres and more than 120 outpatient facilities…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reveals Scattered Spider, the ransomware group responsible for the Marks & Spencer (M&S) cyberattack, allegedly gained access to…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant Dior and steel manufacturing giant Nucor both announced that the companies were dealing with cybersecurity incidents. This…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the world’s largest cryptocurrency exchanges, has confirmed it suffered a significant data breach orchestrated by cybercriminals who…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama is investigating a significant cybersecurity incident that has led to the disruption of certain government services…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of information on American military operations caused a major political incident in March 2025.

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses

Read News
easyprey

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures.

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks are a growing risk – what can businesses do to mitigate them?

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dialysis company, has experienced a ransomware attack. The organization disclosed the incident in a filing with the…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity.

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become a defining moment for consumer privacy in the digital age, 23andMe — the once high-flying genetics…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing company 23andMe quietly filed for bankruptcy over the weekend, and now security experts are worried about the fate…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cautionary tale that underscores the need for greater security, transparency and accountability in the AI ecosystem.

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced AI-driven tools, the Chinese DeepSeek AI application offers incredible innovation. Still, it raises significant data privacy concerns…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they’re evaluating their preparedness from a business,…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity experts have raised concerns over potential security risks in DeepSeek’s artificial intelligence platform after the Chinese AI startup announced…

Read News
Blog

BatShadow: Vietnamesischer Bedrohungsakteur weitet seine digitalen Aktivitäten aus

Read Blog

Wiley’s Internet Technology Letters veröffentlicht Forschung über generative KI für adaptive Bedrohungsjagd

Read Blog

Nordkoreas Kimsuky APT: Eine heimliche Bedrohung, die sich an die sich entwickelnde digitale Welt anpasst

Read Blog

Verstärken Sie Ihr Netzwerk: Wie Aryakas Unified SASE Sie vor fortgeschrittenen Bedrohungen wie Remcos RAT schützt

Read Blog

Fortschrittliche KI-Sicherheitsforschung in der Zeitschrift Communications of the ACM veröffentlicht

Read Blog

Remcos on the Wire: Analyse von Netzwerk-Artefakten und C2-Kommandostrukturen

Read Blog

Snake Infostealer: Ein Blick auf die Datenexfiltration über SMTP

Read Blog

Wir stellen vor: Aryaka Threat Research Lab

Read Blog

SaltTyphoon APT: Unified SASE als Dienst zur Rettung

Read Blog

Unterbrechung der Angriffsfläche mit Unified SASE as a Service durch Abschreckung von bösartiger Kommunikation

Read Blog
Reports

Von der Aufklärung zur Kontrolle

Die operative Blaupause der Kimusky APT für Cyberspionage

View Report
Whitepapers

Aryaka Bedrohungsforschungslabor

Unterbrechung der Angriffsfläche mit Unified SASE as a Service durch Abschreckung von bösartiger Kommunikation

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‚Vampire Bot‘ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News