사이버 위협에 대비하기 위한 인텔리전스
사이버 위협은 빠르게 진화하고 있으며 아리아카도 마찬가지입니다. 아리아카 위협 연구소는 아디트야 K. 수드 박사가 이끄는 위협 인텔리전스 및 연구를 통해 기업이 새로운 위험을 사전에 감지, 완화, 방어할 수 있도록 지원합니다.
아디아카 위협 연구소는 아디아카의 서비스형 통합 SASE 플랫폼에 고급 위협 인사이트를 제공함으로써 혁신을 주도하고 있습니다.
사이버 위협은 빠르게 진화하고 있으며 아리아카도 마찬가지입니다. 아리아카 위협 연구소는 아디트야 K. 수드 박사가 이끄는 위협 인텔리전스 및 연구를 통해 기업이 새로운 위험을 사전에 감지, 완화, 방어할 수 있도록 지원합니다.
아디아카 위협 연구소는 아디아카의 서비스형 통합 SASE 플랫폼에 고급 위협 인사이트를 제공함으로써 혁신을 주도하고 있습니다.
VP of Security Engineering and AI Strategy
Read Bio >
Principal Threat Research Engineer
Read Bio >
Aditya K Sood
VP of Security Engineering and AI Strategy
Aditya K Sood (Ph.D) is the VP of Security Engineering and AI Strategy at Aryaka.. With more than 16 years of experience, he provides strategic leadership in information security, covering products and infrastructure. Dr. Sood is interested in Artificial Intelligence (AI), cloud security, malware automation and analysis, application security, and secure software design. He has authored several papers for various magazines and journals, including IEEE, Elsevier, Crosstalk, ISACA, Virus Bulletin, and Usenix. He has been an active speaker at industry conferences and presented at Blackhat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP, and many others. Dr. Sood obtained his Ph.D. in Computer Sciences from Michigan State University. Dr. Sood is also an author of the "Targeted Cyber Attacks" and “Empirical Cloud Security” books. He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, and KPMG.
Varadharajan K
Principal Threat Research Engineer
Varadharajan Krishnasamy is a principal threat research engineer at Aryaka Networks with over 17 years of experience in cybersecurity. His expertise includes malware analysis, reverse engineering, threat intelligence, incident response, threat hunting and tracking Advanced Persistent Threats (APT). He has worked with leading organizations such as McAfee, Wells Fargo, HCL, Cyble, and Comodo, contributing to the development of detection signatures for advanced threat protection across EDR, XDR, and antivirus platforms.
By 아디트 케이 수드 | By 바라다라잔 케이 | Sep 25, 2025 새로운 Batshadow 위협 보고서 다운로드 또는 인터랙티브 보고서…
Read Blog
최근 저희는 적응형 위협 헌팅 프로세스를 혁신하는 데 있어 생성(GenAI)의 중요성을 강조하는 연구 논문을 Wiley의 인터넷 기술 레터에 발표했습니다. 연구…
Read Blog
By 아디트 케이 수드 | By 바라다라잔 케이 | 2025년 7월 29일 오늘날의 초연결 환경에서 보안 네트워크 경계에 대한 전통적인…
Read Blog
진화하는 사이버 보안 환경에서 Remcos RAT(원격 액세스 트로이목마)와 같은 위협은 점점 더 정교해져 은밀한 기술을 활용하여 네트워크에 침투하고 중요한 데이터를…
Read Blog
악성 AI 모델과 관련된 문제에 대한 최신 연구 결과가 “악의적인 AI 모델이 소프트웨어 공급망 보안을 약화시킨다” 라는 제목으로 ACM 매거진의…
Read Blog
By 바라다라잔 케이 | By 비카시 대쉬 | 06월 02, 2025 개요 Remcos는 2016년 7월에 독일 회사 Breaking Security에서 처음…
Read Blog
SMTP(단순 메일 전송 프로토콜)를 통한 데이터 유출은 공격자가 손상된 시스템에서 외부 위치로 민감한 정보나 기밀 정보를 전송할 때 사용하는 강력한…
Read Blog
사이버 보안 위협은 전례 없이 빠른 속도로 진화하고 있으며, 조직은 끊임없이 위험에 노출되어 있습니다. 이러한 위협에 한발 앞서 대응하고 탁월한…
Read Blog
개요 솔트타이푼과 같은 사건은 기업 및 사용자가 통제할 수 없는 인프라에 대한 종속성으로 인해 침해에 취약하다는 사실을 일깨워주는 좋은 예입니다.…
Read Blog
복원력 있는 사이버 보안은 조직이 사이버 위협과 공격을 견디고, 이에 적응하고, 복구할 수 있는 능력을 강조하는 전략적 접근 방식입니다. 탄력적인…
Read Blog
New Android Warning As Humanized Password Stealer Confirmed
Read News
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.
Read News
Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…
Read News
Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…
Read News
A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive…
Read News
In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional…
Read News
Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Vidar infostealer is badder than…
Read News
The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to…
Read News
More cybercriminals have been utilizing the Vidar information stealer in attacks this year due to the malware’s low barrier of…
Read News
A new report released today by secure access service edge provider Aryaka Networks Inc. is warning of the growing threat…
Read News
A more unified and behavior-aware approach to detection can significantly improve security outcomes.
Read News
An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the…
Read News
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based…
Read News
French luxury giant Dior has confirmed a data breach after experiencing a cyber attack that resulted in unauthorized access to…
Read News
Amajor ransomware attack has struck Kettering Health, a nonprofit network operating 14 medical centres and more than 120 outpatient facilities…
Read News
New information reveals Scattered Spider, the ransomware group responsible for the Marks & Spencer (M&S) cyberattack, allegedly gained access to…
Read News
Luxury fashion giant Dior and steel manufacturing giant Nucor both announced that the companies were dealing with cybersecurity incidents. This…
Read News
Coinbase, one of the world’s largest cryptocurrency exchanges, has confirmed it suffered a significant data breach orchestrated by cybercriminals who…
Read News
The state of Alabama is investigating a significant cybersecurity incident that has led to the disruption of certain government services…
Read News
A leak of information on American military operations caused a major political incident in March 2025.
Read News
Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
Read News
Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures.
Read News
Malware-free attacks are a growing risk – what can businesses do to mitigate them?
Read News
DaVita, a kidney dialysis company, has experienced a ransomware attack. The organization disclosed the incident in a filing with the…
Read News
AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity.
Read News
News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate…
Read News
In what could become a defining moment for consumer privacy in the digital age, 23andMe — the once high-flying genetics…
Read News
Genetic testing company 23andMe quietly filed for bankruptcy over the weekend, and now security experts are worried about the fate…
Read News
DeepSeek AI is a cautionary tale that underscores the need for greater security, transparency and accountability in the AI ecosystem.
Read News
Like many advanced AI-driven tools, the Chinese DeepSeek AI application offers incredible innovation. Still, it raises significant data privacy concerns…
Read News
Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they’re evaluating their preparedness from a business,…
Read News
Cybersecurity experts have raised concerns over potential security risks in DeepSeek’s artificial intelligence platform after the Chinese AI startup announced…
Read News