Announcements Why CISOs Should Invest More Inside Their Infrastructure Tom Gillis June 2, 2022 5 min read
Threat Analysis Unit Serpent - The Backdoor that Hides in Plain Sight Threat Analysis Unit April 25, 2022 11 min read
Executive Viewpoint Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking) Editorial Staff April 13, 2022 1 min read
Threat Analysis Unit ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1) Giovanni Vigna, Oleg Boyarchuk September 28, 2022 21 min read
Threat Analysis Unit Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware Dana Behling September 20, 2022 4 min read
Threat Analysis Unit Threat Report: Illuminating Volume Shadow Deletion Dana Behling September 20, 2022 45 min read
Threat Analysis Unit How to Replicate Emotet Lateral Movement Oleg Boyarchuk, Stefano Ortolani August 19, 2022 15 min read
Threat Analysis Unit How Push Notifications are Abused to Deliver Fraudulent Links Sneha Shekar July 22, 2022 14 min read
Threat Analysis Unit Lateral Movement in the Real World: A Quantitative Analysis Stefano Ortolani, Giovanni Vigna June 29, 2022 18 min read
Network Security How to Build a Detection Lab on VMware’s NSX-T and vSphere Sebastiano Mariani June 1, 2022 8 min read