

Policy Shortfalls Put UK Public Sector Cybersecurity at Risk
Our latest research reveals that fragmented regulatory guidance and unclear internal policies are leaving UK public sector organisations increasingly exposed to cyber threats.
This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment.
Our latest research reveals that fragmented regulatory guidance and unclear internal policies are leaving UK public sector organisations increasingly exposed to cyber threats.
In this blog entry, we discuss how Shadowpad is being used to deploy a new undetected ransomware family. Attackers deploy the malware by exploiting weak passwords and bypassing multi-factor authentication.
Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, and maintain control over compromised systems.
Cyber threats are no longer distant concerns. They are a daily reality for organisations of all sizes, with attacks disrupting operations, supply chains, and causing financial and reputational damage. Yet, despite this, many business leaders still struggle to quantify the true cost of an attack.
This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment.
The Trend ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.
Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.
XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.
The UK government knows that cyberattacks are one of the most dangerous threats facing the country today. The latest National Risk Register puts cyber threats on the same level as pandemics and other national crises—because, in a world that is only becoming more digital, the risks are only intensifying.
Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.