Threat Briefings

Stay ahead of the latest cybersecurity threats with decrypted attack and threat insights designed to keep your organization secure and resilient.

Lucie Cardiet
and
From Conti to Black Basta to DevMan: The Endless Ransomware Rebrand

GangExposed alleges DevMan is Tramp, linking Conti, Black Basta, and DevMan. See how behavioral AI detects ransomware rebrands across variants.

Read more
Lucie Cardiet
and
Could the F5 Breach Expose a New Edge Security Gap?

The F5 compromise shows how attackers exploit trusted edge systems. Learn how to detect hidden behaviors and protect your hybrid infrastructure.

Read more
Lucie Cardiet
and
Qilin’s 2025 Playbook, and the Security Gap it Exposes

Qilin’s 2025 variants use MFA bombing, SIM swapping, and AES-256-CTR encryption to evade detection. Discover how the Vectra AI Platform exposes their behavior before encryption starts.

Read more

Videos

Threat Briefings
Threat Briefing: The NPM Exploit that Turned into a Self-Spreading Worm

Discover how the initial NPM exploit evolved into a self-spreading worm, Shai Hulud, and learn key lessons to protect your software supply chain.

Briefings

Insights straight to your inbox

Sign up for bi-weekly threat briefings and security research findings