Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
imagem

Inteligência para se manter à frente das ameaças cibernéticas

As ameaças cibernéticas estão evoluindo rapidamente – e a Aryaka também. O Aryaka Threat Research Lab, liderado por Aditya K. Sood, Ph.D., fornece inteligência e pesquisa sobre ameaças para ajudar as empresas a detectar, mitigar e se defender proativamente contra riscos emergentes.
Liderado por Aditya K. Sood, Ph.D., o Aryaka Threat Research Lab impulsiona a inovação, fornecendo insights avançados sobre ameaças à plataforma Unified SASE as a Service da Aryaka.

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

BatShadow: agente de ameaças vietnamita expande suas operações digitais

Por Aditya K Sood | Por Varadharajan K | 25 de setembro de 2025 Obtenha o novo Relatório de Ameaças…

Read Blog

A Internet Technology Letters da Wiley publicou uma pesquisa sobre IA generativa para a caça adaptativa de ameaças

Recentemente, publicamos um artigo de pesquisa na Wiley’s Internet Technology Letters destacando a importância da GenAI para revolucionar o processo…

Read Blog

Kimsuky APT da Coreia do Norte: Uma ameaça furtiva que se adapta ao mundo digital em evolução

Por Aditya K Sood | Por Varadharajan K | 29 de julho de 2025 No cenário hiperconectado de hoje, a…

Read Blog

Fortalecendo sua rede: Como o SASE unificado da Aryaka protege contra ameaças avançadas como o Remcos RAT

No cenário em evolução da segurança cibernética, ameaças como o Remcos RAT (Remote Access Trojan) tornaram-se cada vez mais sofisticadas,…

Read Blog

Pesquisa avançada sobre segurança de IA divulgada na revista Communications of the ACM

Nossa pesquisa mais recente sobre os desafios associados aos modelos de IA mal-intencionados foi publicada na revista Communications of the…

Read Blog

Remcos on the Wire: Análise de artefatos de rede e estruturas de comando C2

Por Varadharajan K | Por Bikash Dash | 02 de junho de 2025 Visão geral O Remcos é um trojan…

Read Blog

Snake Infostealer: Um olhar sobre a exfiltração de dados via SMTP

A exfiltração de dados via SMTP (Simple Mail Transfer Protocol) é um método robusto que os invasores usam para transferir…

Read Blog

Apresentando o Laboratório de Pesquisa de Ameaças da Aryaka

As ameaças à segurança cibernética estão evoluindo em um ritmo sem precedentes, colocando as organizações em risco constante. Para ficar…

Read Blog

SaltTyphoon APT: SASE unificado como um serviço para o resgate

Visão geral Eventos como o SaltTyphoon são um excelente lembrete da suscetibilidade das empresas e dos usuários a violações devido…

Read Blog

Interrompendo a superfície de ataque com o SASE unificado como serviço ao impedir a comunicação mal-intencionada

A segurança cibernética resiliente é uma abordagem estratégica que enfatiza a capacidade de uma organização de resistir, adaptar-se e recuperar-se…

Read Blog
report

Do reconhecimento ao controle

O plano operacional da Kimusky APT para espionagem cibernética

View Report
Resource Page Thumbnail

Laboratório de Pesquisa de Ameaças Aryaka

Interrompendo a superfície de ataque com o SASE unificado como serviço ao impedir a comunicação mal-intencionada

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Research Labs has identified a new campaign by the Vietnamese threat actor BatShade, which continues to rely on…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive…

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Vidar infostealer is badder than…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to…

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals have been utilizing the Vidar information stealer in attacks this year due to the malware’s low barrier of…

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report released today by secure access service edge provider Aryaka Networks Inc. is warning of the growing threat…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and behavior-aware approach to detection can significantly improve security outcomes.

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant Dior has confirmed a data breach after experiencing a cyber attack that resulted in unauthorized access to…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware attack has struck Kettering Health, a nonprofit network operating 14 medical centres and more than 120 outpatient facilities…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reveals Scattered Spider, the ransomware group responsible for the Marks & Spencer (M&S) cyberattack, allegedly gained access to…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant Dior and steel manufacturing giant Nucor both announced that the companies were dealing with cybersecurity incidents. This…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the world’s largest cryptocurrency exchanges, has confirmed it suffered a significant data breach orchestrated by cybercriminals who…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama is investigating a significant cybersecurity incident that has led to the disruption of certain government services…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of information on American military operations caused a major political incident in March 2025.

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses

Read News
easyprey

Safe AI Implementation

Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures.

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks are a growing risk – what can businesses do to mitigate them?

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dialysis company, has experienced a ransomware attack. The organization disclosed the incident in a filing with the…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity.

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become a defining moment for consumer privacy in the digital age, 23andMe — the once high-flying genetics…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing company 23andMe quietly filed for bankruptcy over the weekend, and now security experts are worried about the fate…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cautionary tale that underscores the need for greater security, transparency and accountability in the AI ecosystem.

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced AI-driven tools, the Chinese DeepSeek AI application offers incredible innovation. Still, it raises significant data privacy concerns…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they’re evaluating their preparedness from a business,…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity experts have raised concerns over potential security risks in DeepSeek’s artificial intelligence platform after the Chinese AI startup announced…

Read News
Blog

BatShadow: agente de ameaças vietnamita expande suas operações digitais

Read Blog

A Internet Technology Letters da Wiley publicou uma pesquisa sobre IA generativa para a caça adaptativa de ameaças

Read Blog

Kimsuky APT da Coreia do Norte: Uma ameaça furtiva que se adapta ao mundo digital em evolução

Read Blog

Fortalecendo sua rede: Como o SASE unificado da Aryaka protege contra ameaças avançadas como o Remcos RAT

Read Blog

Pesquisa avançada sobre segurança de IA divulgada na revista Communications of the ACM

Read Blog

Remcos on the Wire: Análise de artefatos de rede e estruturas de comando C2

Read Blog

Snake Infostealer: Um olhar sobre a exfiltração de dados via SMTP

Read Blog

Apresentando o Laboratório de Pesquisa de Ameaças da Aryaka

Read Blog

SaltTyphoon APT: SASE unificado como um serviço para o resgate

Read Blog

Interrompendo a superfície de ataque com o SASE unificado como serviço ao impedir a comunicação mal-intencionada

Read Blog
Reports

Do reconhecimento ao controle

O plano operacional da Kimusky APT para espionagem cibernética

View Report
Whitepapers

Laboratório de Pesquisa de Ameaças Aryaka

Interrompendo a superfície de ataque com o SASE unificado como serviço ao impedir a comunicação mal-intencionada

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News