Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
img

Inteligencia para adelantarse a las ciberamenazas

Las ciberamenazas evolucionan rápidamente – y Aryaka también. El Laboratorio de Investigación de Amenazas de Aryaka, dirigido por el doctor Aditya K. Sood, ofrece inteligencia e investigación sobre amenazas para ayudar a las empresas a detectar, mitigar y defenderse de forma proactiva de los riesgos emergentes.
Dirigido por Aditya K. Sood, Ph.D., el Laboratorio de Investigación de Amenazas de Aryaka impulsa la innovación alimentando con conocimientos avanzados sobre amenazas la plataforma SASE unificada como servicio de Aryaka.

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

BatShadow: un actor vietnamita de amenazas amplía sus operaciones digitales

Por Aditya K Sood | Por Varadharajan K | 25 de septiembre de 2025 Obtenga el nuevo informe sobre amenazas…

Read Blog

Internet Technology Letters de Wiley publicó una investigación sobre IA generativa para la caza adaptativa de amenazas

Recientemente, publicamos un artículo de investigación en la revista Wiley’s Internet Technology Letters sobre la importancia de la Generative (GenAI)…

Read Blog

La APT Kimsuky de Corea del Norte: Una amenaza sigilosa que se adapta a la evolución del mundo digital

Por Aditya K Sood | Por Varadharajan K | 29 de julio de 2025 En el paisaje hiperconectado actual, la…

Read Blog

Fortificando su red: Cómo el SASE unificado de Aryaka protege contra amenazas avanzadas como Remcos RAT

En el cambiante panorama de la ciberseguridad, amenazas como Remcos RAT (troyano de acceso remoto) se han vuelto cada vez…

Read Blog

La revista Communications of the ACM publica una investigación avanzada sobre la seguridad de la IA

Nuestra última investigación sobre los retos asociados a losmodelosde IA maliciosos se ha publicado en la revista Communications of the…

Read Blog

Remcos en la Red: Análisis de artefactos de red y estructuras de mando C2

Por Varadharajan K | Por Bikash Dash | 02 de junio de 2025 Visión general Remcos es un troyano de…

Read Blog

Snake Infostealer: Una mirada a la exfiltración de datos a través de SMTP

La exfiltración de datos a través del Protocolo Simple de Transferencia de Correo (SMTP) es un método sólido que los…

Read Blog

Presentación del Laboratorio de Investigación de Amenazas Aryaka

Las amenazas a la ciberseguridad evolucionan a un ritmo sin precedentes, poniendo a las organizaciones en riesgo constante. Para adelantarse…

Read Blog

SaltTyphoon APT: SASE unificado como servicio al rescate

Visión general Sucesos como SaltTyphoon son un excelente recordatorio de la susceptibilidad de las empresas y los usuarios a las…

Read Blog

Interrumpir la superficie de ataque con SASE unificado como servicio mediante la disuasión de la comunicación maliciosa

La ciberseguridad resistente es un enfoque estratégico que hace hincapié en la capacidad de una organización para resistir, adaptarse y…

Read Blog
report

Del reconocimiento al control

El plan operativo del APT Kimusky para el ciberespionaje

View Report
Resource Page Thumbnail

Laboratorio de investigación de amenazas Aryaka

Interrumpir la superficie de ataque con SASE unificado como servicio mediante la disuasión de la comunicación maliciosa

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive…

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Vidar infostealer is badder than…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to…

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals have been utilizing the Vidar information stealer in attacks this year due to the malware’s low barrier of…

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report released today by secure access service edge provider Aryaka Networks Inc. is warning of the growing threat…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and behavior-aware approach to detection can significantly improve security outcomes.

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant Dior has confirmed a data breach after experiencing a cyber attack that resulted in unauthorized access to…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware attack has struck Kettering Health, a nonprofit network operating 14 medical centres and more than 120 outpatient facilities…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reveals Scattered Spider, the ransomware group responsible for the Marks & Spencer (M&S) cyberattack, allegedly gained access to…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant Dior and steel manufacturing giant Nucor both announced that the companies were dealing with cybersecurity incidents. This…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the world’s largest cryptocurrency exchanges, has confirmed it suffered a significant data breach orchestrated by cybercriminals who…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama is investigating a significant cybersecurity incident that has led to the disruption of certain government services…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of information on American military operations caused a major political incident in March 2025.

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses

Read News
easyprey

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures.

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks are a growing risk – what can businesses do to mitigate them?

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dialysis company, has experienced a ransomware attack. The organization disclosed the incident in a filing with the…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity.

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become a defining moment for consumer privacy in the digital age, 23andMe — the once high-flying genetics…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing company 23andMe quietly filed for bankruptcy over the weekend, and now security experts are worried about the fate…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cautionary tale that underscores the need for greater security, transparency and accountability in the AI ecosystem.

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced AI-driven tools, the Chinese DeepSeek AI application offers incredible innovation. Still, it raises significant data privacy concerns…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they’re evaluating their preparedness from a business,…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity experts have raised concerns over potential security risks in DeepSeek’s artificial intelligence platform after the Chinese AI startup announced…

Read News
Blog

BatShadow: un actor vietnamita de amenazas amplía sus operaciones digitales

Read Blog

Internet Technology Letters de Wiley publicó una investigación sobre IA generativa para la caza adaptativa de amenazas

Read Blog

La APT Kimsuky de Corea del Norte: Una amenaza sigilosa que se adapta a la evolución del mundo digital

Read Blog

Fortificando su red: Cómo el SASE unificado de Aryaka protege contra amenazas avanzadas como Remcos RAT

Read Blog

La revista Communications of the ACM publica una investigación avanzada sobre la seguridad de la IA

Read Blog

Remcos en la Red: Análisis de artefactos de red y estructuras de mando C2

Read Blog

Snake Infostealer: Una mirada a la exfiltración de datos a través de SMTP

Read Blog

Presentación del Laboratorio de Investigación de Amenazas Aryaka

Read Blog

SaltTyphoon APT: SASE unificado como servicio al rescate

Read Blog

Interrumpir la superficie de ataque con SASE unificado como servicio mediante la disuasión de la comunicación maliciosa

Read Blog
Reports

Del reconocimiento al control

El plan operativo del APT Kimusky para el ciberespionaje

View Report
Whitepapers

Laboratorio de investigación de amenazas Aryaka

Interrumpir la superficie de ataque con SASE unificado como servicio mediante la disuasión de la comunicación maliciosa

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News