Threat Briefings

Stay ahead of the latest cybersecurity threats with decrypted attack and threat insights designed to keep your organization secure and resilient.

Lucie Cardiet
and
How Typhoon APTs Infiltrate Infrastructure Without Leaving a Trace

Chinese state-backed Typhoon APTs infiltrate networks using trusted tools. Learn how the Vectra AI Platform detects their stealthy, persistent behavior.

Read more
Lucie Cardiet
and
From Conti to Black Basta to DevMan: The Endless Ransomware Rebrand

GangExposed alleges DevMan is Tramp, linking Conti, Black Basta, and DevMan. See how behavioral AI detects ransomware rebrands across variants.

Read more
Lucie Cardiet
and
Could the F5 Breach Expose a New Edge Security Gap?

The F5 compromise shows how attackers exploit trusted edge systems. Learn how to detect hidden behaviors and protect your hybrid infrastructure.

Read more

Videos

Threat Briefings
Threat Briefing: The NPM Exploit that Turned into a Self-Spreading Worm

Discover how the initial NPM exploit evolved into a self-spreading worm, Shai Hulud, and learn key lessons to protect your software supply chain.

Briefings

Insights straight to your inbox

Sign up for bi-weekly threat briefings and security research findings