图像

利用智能防范网络威胁

网络威胁发展迅速,Aryaka也是如此。由 Aditya K. Sood 博士领导的 Aryaka 威胁研究实验室提供威胁情报和研究,帮助企业主动检测、减轻和防御新兴风险。
Aditya K. Sood博士的领导下Aryaka威胁研究实验室通过向Aryaka的统一SASE即服务平台提供先进的威胁洞察力来推动创新。

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

无声间谍了解 APT36 的持久活动

世界各地的关键基础设施正受到高度组织化、…

Read Blog

云中的幽灵欺诈者利用谷歌云存储进行欺骗活动

一切始于耳语–在一个普通的周…

Read Blog

蝙蝠影:越南威胁行动者扩大其数字行动

By Aditya K Sood | B…

Read Blog

Wiley 的《互联网技术快报》发表了关于用于自适应威胁猎杀的生成式人工智能的研究成果

最近,我们在Wiley 的《互联网技术通…

Read Blog

朝鲜的 Kimsuky APT:适应不断发展的数字世界的隐形威胁

作者:Aditya K Sood | 作…

Read Blog

强化您的网络:Aryaka 的统一 SASE 如何抵御 Remcos RAT 等高级威胁

在不断变化的网络安全环境中,Remcos…

Read Blog

ACM 通信》杂志发布高级人工智能安全研究成果

我们关于恶意人工智能模型相关挑战的最新研…

Read Blog

窃听中的雷姆科斯分析网络人工制品和 C2 指挥结构

作者 Varadharajan K | …

Read Blog

蛇形信息窃取器了解通过 SMTP 进行的数据外泄

通过简单邮件传输协议(SMTP)进行数据…

Read Blog

介绍 Aryaka 威胁研究实验室

网络安全威胁正在以前所未有的速度演变,使…

Read Blog

SaltTyphoon APT:统一 SASE 作为一种服务提供救援

概述 像 SaltTyphoon 这样的…

Read Blog

利用统一 SASE 即服务阻止恶意通信,破坏攻击面

弹性网络安全是一种战略方法,强调组织抵御…

Read Blog
report 1

揭开透明部落(APT36)C&C 和网络技术的神秘面纱

针对印度政府和国防

View Report
report 2

云中的骗局

攻击者如何利用谷歌云存储发起多阶段欺诈活…

View Report
report 3

越南威胁行为者扩大行动范围

新的 "蝙蝠遮阳 "活动占据中心舞台

View Report
report 5

从侦察到控制

基穆斯基网络间谍 APT 的行动蓝图

View Report
whitepaper 1

雅利安卡威胁研究实验室

利用统一 SASE 即服务阻止恶意通信,…

Read Whitepaper
techradar

Russian hackers target HR departments with vicious new ‘BlackSanta’ malware

Russian hackers have…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

HR departments are being targeted with fake resumes that disable security protection

A threat campaign ag…

Read News
security week

‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload

The malware disables…

Read News
SC Media

BlackSanta ‘EDR-killer’ malware targets HR departments

A specialized “EDR-k…

Read News
hackread

BlackSanta Malware Targets HR Staff with Fake CV Downloads

Aryaka researchers h…

Read News
infosecurity trl

BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign

A new malware campai…

Read News
gbhackers

HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware

Threat actors are in…

Read News
security boulevard

BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations

Russian threat actor…

Read News
CSO

Resumés with malicious ISO attachments are circulating, says Aryaka

HR staff need to und…

Read News
DarkReading

‘BlackSanta’ EDR Killer Targets HR Workflows

A campaign by Russia…

Read News
theregister logo

Fake job applications pack malware that kills endpoint detection before stealing data

A Russian-speaking c…

Read News
bleepingcomputer

New ‘BlackSanta’ EDR killer spotted targeting HR departments

For more than a year…

Read News
help net security

HR, recruiters targeted in year-long malware campaign

An attack campaign t…

Read News
Computer weekly

Convergence – The Sequel (And How To Avoid Trade-Offs)

I recently published…

Read News
Computer weekly

Making sense of AI’s role in cyber security

Cyber security compa…

Read News
cyber security news

APT36 Hacker Group Attacking Linux Systems with New Tools to Disturb Services

Indian defense secto…

Read News
The Hackewr news

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense secto…

Read News
SC Media

Report sheds light on multi-pronged APT36 attacks against India

Indian government an…

Read News
security week

RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India

Transparent Tribe (A…

Read News
gbhackers logo

APT36 Targets Linux Systems With New Tools Designed to Disrupt Services

Critical infrastruct…

Read News
Computer weekly

From promise to proof: making AI security adoption tangible

The Security Think T…

Read News
Cloud 365

Unified SASE e Segurança Integrada Marcam os Desafios Reais dos CISO Portugueses

A visibilidade conti…

Read News
Computer weekly

From trust to turbulence: Cyber’s road ahead in 2026

As we prepare to clo…

Read News
CSO

Suspicious traffic could be testing CDN evasion, says expert

An individual or gro…

Read News
Forbes

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning …

Read News
DarkReading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the …

Read News
IT Brief

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
Security Brief

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
The Hackewr news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat …

Read News
The Hackewr news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where thr…

Read News
Bankind Info

Breach Roundup: Vidar Strikes Back

Every week, ISMG rou…

Read News
DarkReading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar …

Read News
SC Media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals …

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report release…

Read News
DarkReading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and b…

Read News
DarkReading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who pose…

Read News
Computer weekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think T…

Read News
CPO

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant …

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware at…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reve…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama…

Read News
Computer weekly

Unspoken risk: Human factors undermine trusted platforms

A leak of informatio…

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware …

Read News
easyprey

Safe AI Implementation

Red models associate…

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks…

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dia…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybe…

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing comp…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cau…

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced A…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are incr…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity expert…

Read News
Blog

无声间谍了解 APT36 的持久活动

Read Blog

云中的幽灵欺诈者利用谷歌云存储进行欺骗活动

Read Blog

蝙蝠影:越南威胁行动者扩大其数字行动

Read Blog

Wiley 的《互联网技术快报》发表了关于用于自适应威胁猎杀的生成式人工智能的研究成果

Read Blog

朝鲜的 Kimsuky APT:适应不断发展的数字世界的隐形威胁

Read Blog

强化您的网络:Aryaka 的统一 SASE 如何抵御 Remcos RAT 等高级威胁

Read Blog

ACM 通信》杂志发布高级人工智能安全研究成果

Read Blog

窃听中的雷姆科斯分析网络人工制品和 C2 指挥结构

Read Blog

蛇形信息窃取器了解通过 SMTP 进行的数据外泄

Read Blog

介绍 Aryaka 威胁研究实验室

Read Blog

SaltTyphoon APT:统一 SASE 作为一种服务提供救援

Read Blog

利用统一 SASE 即服务阻止恶意通信,破坏攻击面

Read Blog
Reports

揭开透明部落(APT36)C&C 和网络技术的神秘面纱

针对印度政府和国防

View Report

云中的骗局

攻击者如何利用谷歌云存储发起多阶段欺诈活…

View Report

越南威胁行为者扩大行动范围

新的 "蝙蝠遮阳 "活动占据中心舞台

View Report

从侦察到控制

基穆斯基网络间谍 APT 的行动蓝图

View Report
Whitepapers

雅利安卡威胁研究实验室

利用统一 SASE 即服务阻止恶意通信,…

Read Whitepaper
News
techradar

Russian hackers target HR departments with vicious new ‘BlackSanta’ malware

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

HR departments are being targeted with fake resumes that disable security protection

Read News
security week

‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload

Read News
SC Media

BlackSanta ‘EDR-killer’ malware targets HR departments

Read News
hackread

BlackSanta Malware Targets HR Staff with Fake CV Downloads

Read News
infosecurity trl

BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign

Read News
gbhackers

HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware

Read News
security boulevard

BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations

Read News
CSO

Resumés with malicious ISO attachments are circulating, says Aryaka

Read News
DarkReading

‘BlackSanta’ EDR Killer Targets HR Workflows

Read News
theregister logo

Fake job applications pack malware that kills endpoint detection before stealing data

Read News
bleepingcomputer

New ‘BlackSanta’ EDR killer spotted targeting HR departments

Read News