Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
イムグ

サイバー脅威を先取りするインテリジェンス

サイバー脅威は急速に進化しています。Aditya K. Sood博士が率いるAryaka Threat Research Labは、脅威インテリジェンスとリサーチを提供し、企業が新たなリスクをプロアクティブに検出、軽減、防御できるよう支援します。
Aditya K. Sood博士が率いるAryaka Threat Research Labは、高度な脅威に関する洞察をAryakaのUnified SASE as a Serviceプラットフォームに提供することで、イノベーションを推進しています。

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

BatShadow:ベトナムの脅威組織がデジタル事業を拡大

By アディティヤ・K・スード| By …

Read Blog

Wiley社のInternet Technology Lettersに、適応型脅威ハンティングのための生成AIに関する研究が掲載されました。

最近、私たちはWiley’s…

Read Blog

北朝鮮のキムスキーAPT:進化するデジタル世界に適応するステルス型脅威

By アディティヤ・K・スード| By …

Read Blog

ネットワークの強化Aryakaの統合SASEがRemcos RATのような高度な脅威をどのように防御するか

サイバーセキュリティの進化に伴い、Rem…

Read Blog

最先端AIセキュリティ研究がCommunications of the ACM誌で発表

悪意のあるAIモデルに関連する課題に関す…

Read Blog

レムコス・オン・ザ・ワイヤーネットワークアーティファクトとC2コマンド構造の分析

By ヴァラダラジャン・K| By ビカ…

Read Blog

スネーク・インフォステーラーSMTP経由のデータ流出に関する考察

SMTP(Simple Mail Tra…

Read Blog

Aryakaスレットリサーチラボのご紹介

サイバーセキュリティの脅威はかつてないペ…

Read Blog

ソルトタイフーンAPTサービスとしての統一されたSASEによる救済

概要 SaltTyphoonのような出来…

Read Blog

Unified SASE as a Serviceによる悪意のある通信の阻止による攻撃表面の破壊

レジリエント・サイバーセキュリティとは、…

Read Blog
report

偵察からコントロールへ

キムスキーAPTのサイバー・エスピオナー…

View Report
Resource Page Thumbnail

アーヤカ脅威研究所

Unified SASE as a Se…

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning …

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the …

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat …

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where thr…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rou…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar …

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals …

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report release…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and b…

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who pose…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think T…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant …

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware at…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reve…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of informatio…

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware …

Read News
easyprey

Safe AI Implementation

Red models associate…

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks…

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dia…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybe…

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing comp…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cau…

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced A…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are incr…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity expert…

Read News
Blog

BatShadow:ベトナムの脅威組織がデジタル事業を拡大

Read Blog

Wiley社のInternet Technology Lettersに、適応型脅威ハンティングのための生成AIに関する研究が掲載されました。

Read Blog

北朝鮮のキムスキーAPT:進化するデジタル世界に適応するステルス型脅威

Read Blog

ネットワークの強化Aryakaの統合SASEがRemcos RATのような高度な脅威をどのように防御するか

Read Blog

最先端AIセキュリティ研究がCommunications of the ACM誌で発表

Read Blog

レムコス・オン・ザ・ワイヤーネットワークアーティファクトとC2コマンド構造の分析

Read Blog

スネーク・インフォステーラーSMTP経由のデータ流出に関する考察

Read Blog

Aryakaスレットリサーチラボのご紹介

Read Blog

ソルトタイフーンAPTサービスとしての統一されたSASEによる救済

Read Blog

Unified SASE as a Serviceによる悪意のある通信の阻止による攻撃表面の破壊

Read Blog
Reports

偵察からコントロールへ

キムスキーAPTのサイバー・エスピオナー…

View Report
Whitepapers

アーヤカ脅威研究所

Unified SASE as a Se…

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News