Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>
图像

利用智能防范网络威胁

网络威胁发展迅速,Aryaka也是如此。由 Aditya K. Sood 博士领导的 Aryaka 威胁研究实验室提供威胁情报和研究,帮助企业主动检测、减轻和防御新兴风险。
Aditya K. Sood博士的领导下Aryaka威胁研究实验室通过向Aryaka的统一SASE即服务平台提供先进的威胁洞察力来推动创新。

Contributors

Aditya K Sood
Aditya K Sood

VP of Security Engineering and AI Strategy

Read Bio >

Varadharajan K
Varadharajan K

Principal Threat Research Engineer

Read Bio >

Explore our latest research below

Blog
Report
Whitepapers
News

蝙蝠影:越南威胁行动者扩大其数字行动

By Aditya K Sood | B…

Read Blog

Wiley 的《互联网技术快报》发表了关于用于自适应威胁猎杀的生成式人工智能的研究成果

最近,我们在Wiley 的《互联网技术通…

Read Blog

朝鲜的 Kimsuky APT:适应不断发展的数字世界的隐形威胁

作者:Aditya K Sood | 作…

Read Blog

强化您的网络:Aryaka 的统一 SASE 如何抵御 Remcos RAT 等高级威胁

在不断变化的网络安全环境中,Remcos…

Read Blog

ACM 通信》杂志发布高级人工智能安全研究成果

我们关于恶意人工智能模型相关挑战的最新研…

Read Blog

窃听中的雷姆科斯分析网络人工制品和 C2 指挥结构

作者 Varadharajan K | …

Read Blog

蛇形信息窃取器了解通过 SMTP 进行的数据外泄

通过简单邮件传输协议(SMTP)进行数据…

Read Blog

介绍 Aryaka 威胁研究实验室

网络安全威胁正在以前所未有的速度演变,使…

Read Blog

SaltTyphoon APT:统一 SASE 作为一种服务提供救援

概述 像 SaltTyphoon 这样的…

Read Blog

利用统一 SASE 即服务阻止恶意通信,破坏攻击面

弹性网络安全是一种战略方法,强调组织抵御…

Read Blog
Vietnamese report

越南威胁行为者扩大行动范围

新的 "蝙蝠遮阳 "活动占据中心舞台

View Report
report

从侦察到控制

基穆斯基网络间谍 APT 的行动蓝图

View Report
Resource Page Thumbnail

雅利安卡威胁研究实验室

利用统一 SASE 即服务阻止恶意通信,…

Read Whitepaper
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

New Android Warning …

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

The campaign is the …

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Aryaka Threat Resear…

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

A Vietnamese threat …

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

In a world where thr…

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Every week, ISMG rou…

Read News
dark reading

Vidar Infostealer Back With a Vengeance

The pervasive Vidar …

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

More cybercriminals …

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

A new report release…

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

A more unified and b…

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who pose…

Read News
computerweekly

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think T…

Read News
Aryaka Threat Research Lab News Coverage - CPO Magazine

French Luxury Giant Dior Confirms Data Breach after a Cyber Attack

French luxury giant …

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Ransomware hits Kettering Health: Experts speak out

Amajor ransomware at…

Read News
Aryaka Threat Research Lab News Coverage - Cybernews

M&S hackers used employee logins from third-party consulting firm TCS, sources say

New information reve…

Read News
Aryaka Threat Research Lab News Coverage - Digital Journal

Perfume and steel: Dior and Nucor in cyberattacks

Luxury fashion giant…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Coinbase offers USD $20 million bounty after insider data breach

Coinbase, one of the…

Read News
Aryaka Threat Research Lab News Coverage - SecurityBrief United States

Alabama cyberattack exposes state staff credentials, disrupts services

The state of Alabama…

Read News
computerweekly

Unspoken risk: Human factors undermine trusted platforms

A leak of informatio…

Read News
itpro logo

What is polymorphic malware?

Polymorphic malware …

Read News
easyprey

Safe AI Implementation

Red models associate…

Read News
itpro logo

Malware-free attacks: The threat to businesses

Malware-free attacks…

Read News
security news

Kidney dialysis firm DaVita hit by weekend ransomware attack

DaVita, a kidney dia…

Read News
helpnetsecurity

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybe…

Read News
sc media

Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy

News of the troubled…

Read News
enterprise security tech

23andMe Bankruptcy Sparks Urgent DNA Data Privacy Reckoning

In what could become…

Read News
dark reading

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Genetic testing comp…

Read News
sc media uk

DeepSeek AI: The Hidden Perils of Data Privacy and Security

DeepSeek AI is a cau…

Read News
csi

DeepSeek – A Deep Dive Reveals More Than One Red Flag

Like many advanced A…

Read News
betanews

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are incr…

Read News
security brief

Experts warn of security risks as DeepSeek limits new sign-ups

Cybersecurity expert…

Read News
Blog

蝙蝠影:越南威胁行动者扩大其数字行动

Read Blog

Wiley 的《互联网技术快报》发表了关于用于自适应威胁猎杀的生成式人工智能的研究成果

Read Blog

朝鲜的 Kimsuky APT:适应不断发展的数字世界的隐形威胁

Read Blog

强化您的网络:Aryaka 的统一 SASE 如何抵御 Remcos RAT 等高级威胁

Read Blog

ACM 通信》杂志发布高级人工智能安全研究成果

Read Blog

窃听中的雷姆科斯分析网络人工制品和 C2 指挥结构

Read Blog

蛇形信息窃取器了解通过 SMTP 进行的数据外泄

Read Blog

介绍 Aryaka 威胁研究实验室

Read Blog

SaltTyphoon APT:统一 SASE 作为一种服务提供救援

Read Blog

利用统一 SASE 即服务阻止恶意通信,破坏攻击面

Read Blog
Reports

越南威胁行为者扩大行动范围

新的 "蝙蝠遮阳 "活动占据中心舞台

View Report

从侦察到控制

基穆斯基网络间谍 APT 的行动蓝图

View Report
Whitepapers

雅利安卡威胁研究实验室

利用统一 SASE 即服务阻止恶意通信,…

Read Whitepaper
News
forbes logo 2

New Android Warning As Humanized Password Stealer Confirmed

Read News
dark reading

Vampire Bot Malware Sinks Fangs Into Job Hunters

Read News
Screenshot 2025 11 14 at 9.52.40 AM removebg preview 2

BatShade: Vietnamese threat actor expands its digital operations

Read News
security brief 1

BatShade: Vietnamese threat actor expands its digital operations

Read News
trl the hacker news

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Read News
trl the hacker news

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Read News
bank info trl

Breach Roundup: Vidar Strikes Back

Read News
dark reading

Vidar Infostealer Back With a Vengeance

Read News
trl Sc media

Adoption of Vidar infostealer on the rise, report finds

Read News
trl silicon

Vidar infostealer gains traction among cybercriminals as ease of use drives adoption

Read News
dark reading

How Evolving RATs Are Redefining Enterprise Security Threats

Read News
dark reading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

Read News