Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Cybermenaces

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

January 09, 2025
Risques liés à la & conformité

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Expert Perspective Jan 31, 2025

Save to Folio

Expert Perspective Jan 31, 2025

Save to Folio

NDR: Not Just a "Nice to Have" Anymore

Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Expert Perspective Jan 30, 2025

Save to Folio

Expert Perspective Jan 30, 2025

Save to Folio

ASRM: A New Pillar for Cyber Insurance Underwriting

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Expert Perspective Jan 29, 2025

Save to Folio

Expert Perspective Jan 29, 2025

Save to Folio

Intelligence artificielle (IA)

Invisible Prompt Injection: A Threat to AI Security

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Expert Perspective Jan 22, 2025

Save to Folio

Expert Perspective Jan 22, 2025

Save to Folio

IdO (Internet des objets)

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Research Jan 17, 2025

Save to Folio

Research Jan 17, 2025

Save to Folio

Risques liés à la & conformité

World Tour Survey: Cloud Engineers Wrestle with Risk

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what cloud security engineers teams had to say.

Research Jan 13, 2025

Save to Folio

Research Jan 13, 2025

Save to Folio