Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
img

L’intelligence pour garder une longueur d’avance sur les cybermenaces

Les cybermenaces évoluent rapidement, tout comme Aryaka. Le laboratoire de recherche sur les menaces d’Aryaka, dirigé par Aditya K. Sood, Ph.D., fournit des informations et des recherches sur les menaces afin d’aider les entreprises à détecter, atténuer et se défendre de manière proactive contre les risques émergents.
Dirigé par Aditya K. Sood, Ph.D., le laboratoire de recherche sur les menaces d’Aryaka stimule l’innovation en alimentant la plateforme unifiée SASE as a Service d’Aryaka avec des informations avancées sur les menaces.

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

BatShadow : un acteur vietnamien de la menace étend ses opérations numériques

Par Aditya K Sood | Par Varadharajan K | 25 sept. 2025 Obtenez le nouveau rapport sur les menaces de…

Read Blog

Les Internet Technology Letters de Wiley ont publié une recherche sur l’IA générative pour la chasse aux menaces adaptative.

Récemment, nous avons publié un article de recherche dans Internet Technology Letters de Wiley sur l’importance de l’IA générative (GenAI)…

Read Blog

L’APT Kimsuky de la Corée du Nord : Une menace furtive qui s’adapte à l’évolution du monde numérique

Par Aditya K Sood | Par Varadharajan K | 29 juillet 2025 Dans le paysage hyperconnecté d’aujourd’hui, la notion traditionnelle…

Read Blog

Fortifier votre réseau : Comment le SASE unifié d’Aryaka protège contre les menaces avancées telles que Remcos RAT

Dans le paysage évolutif de la cybersécurité, les menaces telles que Remcos RAT (Remote Access Trojan) sont devenues de plus…

Read Blog

La recherche avancée sur la sécurité de l’IA publiée dans le magazine Communications of the ACM

Nos dernières recherches sur les défis associés aux modèles d’IA malveillants ont été publiées dans le magazine Communications of the…

Read Blog

Remcos sur le fil : Analyse des artefacts du réseau et des structures de commandement C2

Par Varadharajan K | Par Bikash Dash | 02 juin 2025 Vue d’ensemble Remcos est un cheval de Troie d’accès…

Read Blog

Snake Infostealer : Un aperçu de l’exfiltration de données via SMTP

L’exfiltration de données via le protocole SMTP (Simple Mail Transfer Protocol) est une méthode robuste utilisée par les attaquants pour…

Read Blog

Présentation du laboratoire de recherche sur les menaces d’Aryaka

Les menaces de cybersécurité évoluent à un rythme sans précédent, exposant les entreprises à un risque constant. Pour garder une…

Read Blog

SaltTyphoon APT : SASE unifié en tant que service à la rescousse

Vue d’ensemble Des événements tels que SaltTyphoon nous rappellent que les entreprises et les utilisateurs sont exposés à des violations…

Read Blog

Perturber la surface d’attaque avec le SASE unifié en tant que service en dissuadant les communications malveillantes

La cybersécurité résiliente est une approche stratégique qui met l’accent sur la capacité d’une organisation à résister aux cybermenaces et…

Read Blog
report

De la reconnaissance au contrôle

Le schéma opérationnel de l'APT Kimusky pour le cyber-espionnage

View Report
Resource Page Thumbnail

Laboratoire de recherche sur les menaces d’Aryaka

Perturber la surface d’attaque avec le SASE unifié en tant que service en dissuadant les communications malveillantes

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive…

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Vidar infostealer is badder than…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to…

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals have been utilizing the Vidar information stealer in attacks this year due to the malware’s low barrier of…

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report released today by secure access service edge provider Aryaka Networks Inc. is warning of the growing threat…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and behavior-aware approach to detection can significantly improve security outcomes.

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant Dior has confirmed a data breach after experiencing a cyber attack that resulted in unauthorized access to…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware attack has struck Kettering Health, a nonprofit network operating 14 medical centres and more than 120 outpatient facilities…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reveals Scattered Spider, the ransomware group responsible for the Marks & Spencer (M&S) cyberattack, allegedly gained access to…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant Dior and steel manufacturing giant Nucor both announced that the companies were dealing with cybersecurity incidents. This…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the world’s largest cryptocurrency exchanges, has confirmed it suffered a significant data breach orchestrated by cybercriminals who…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama is investigating a significant cybersecurity incident that has led to the disruption of certain government services…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of information on American military operations caused a major political incident in March 2025.

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses

Read News
easyprey

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures.

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks are a growing risk – what can businesses do to mitigate them?

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dialysis company, has experienced a ransomware attack. The organization disclosed the incident in a filing with the…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity.

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become a defining moment for consumer privacy in the digital age, 23andMe — the once high-flying genetics…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing company 23andMe quietly filed for bankruptcy over the weekend, and now security experts are worried about the fate…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cautionary tale that underscores the need for greater security, transparency and accountability in the AI ecosystem.

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced AI-driven tools, the Chinese DeepSeek AI application offers incredible innovation. Still, it raises significant data privacy concerns…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they’re evaluating their preparedness from a business,…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity experts have raised concerns over potential security risks in DeepSeek’s artificial intelligence platform after the Chinese AI startup announced…

Read News
Blog

BatShadow : un acteur vietnamien de la menace étend ses opérations numériques

Read Blog

Les Internet Technology Letters de Wiley ont publié une recherche sur l’IA générative pour la chasse aux menaces adaptative.

Read Blog

L’APT Kimsuky de la Corée du Nord : Une menace furtive qui s’adapte à l’évolution du monde numérique

Read Blog

Fortifier votre réseau : Comment le SASE unifié d’Aryaka protège contre les menaces avancées telles que Remcos RAT

Read Blog

La recherche avancée sur la sécurité de l’IA publiée dans le magazine Communications of the ACM

Read Blog

Remcos sur le fil : Analyse des artefacts du réseau et des structures de commandement C2

Read Blog

Snake Infostealer : Un aperçu de l’exfiltration de données via SMTP

Read Blog

Présentation du laboratoire de recherche sur les menaces d’Aryaka

Read Blog

SaltTyphoon APT : SASE unifié en tant que service à la rescousse

Read Blog

Perturber la surface d’attaque avec le SASE unifié en tant que service en dissuadant les communications malveillantes

Read Blog
Reports

De la reconnaissance au contrôle

Le schéma opérationnel de l'APT Kimusky pour le cyber-espionnage

View Report
Whitepapers

Laboratoire de recherche sur les menaces d’Aryaka

Perturber la surface d’attaque avec le SASE unifié en tant que service en dissuadant les communications malveillantes

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News