Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
Exploits & Vulnerabilities

CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.

February 04, 2025
Endpoints

Native Sensors vs. Integrations for XDR Platforms?

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

Expert Perspective Feb 03, 2025

Save to Folio

Expert Perspective Feb 03, 2025

Save to Folio

Compliance & Risks

Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Expert Perspective Jan 31, 2025

Save to Folio

Expert Perspective Jan 31, 2025

Save to Folio

NDR: Not Just a "Nice to Have" Anymore

Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Expert Perspective Jan 30, 2025

Save to Folio

Expert Perspective Jan 30, 2025

Save to Folio

ASRM: A New Pillar for Cyber Insurance Underwriting

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Expert Perspective Jan 29, 2025

Save to Folio

Expert Perspective Jan 29, 2025

Save to Folio

Artificial Intelligence (AI)

Invisible Prompt Injection: A Threat to AI Security

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Expert Perspective Jan 22, 2025

Save to Folio

Expert Perspective Jan 22, 2025

Save to Folio