HR, recruiters targeted in year-long malware campaign
10 3 月, 2026
An attack campaign targeting HR departments and job rec…
Convergence – The Sequel (And How To Avoid Trade-Offs)
18 2 月, 2026
I recently published a blog, post-conversation with Alb…
Making sense of AI’s role in cyber security
16 2 月, 2026
Cyber security companies have jumped on the AI bandwago…
10 Network-As-A-Service Companies To Watch In 2026
13 2 月, 2026
Converged networking and security specialist Aryaka in …
APT36 Hacker Group Attacking Linux Systems with New Tools to Disturb Services
12 2 月, 2026
Indian defense sector and government-aligned organizati…
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
11 2 月, 2026
Indian defense sector and government-aligned organizati…
Report sheds light on multi-pronged APT36 attacks against India
11 2 月, 2026
Indian government and defense organizations have been t…
RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India
10 2 月, 2026
Transparent Tribe (APT36) is targeting Indian defense a…
APT36 Targets Linux Systems With New Tools Designed to Disrupt Services
10 2 月, 2026
Critical infrastructure worldwide faces mounting threat…
From promise to proof: making AI security adoption tangible
9 1 月, 2026
The Security Think Tank considers what CISOs and buyers…
The 10 Hottest AI Networking Tools Of 2025
22 12 月, 2025
An increased focus on networking and the infrastructure…