Category: VendorResearch

From Reactive Defense to Threat Intelligence
09
Mar
2026

From Reactive Defense to Threat Intelligence

Ask any CISO in Latin America what keeps them up at night and you’ll hear the same answers: ransomware, payment…

09
Mar
2026

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

Today’s security leaders are operating in an environment of truncated cyberattack timelines with aging defenses built for slower, linear cyberthreats…

Timeline of Failed Successors to Breach, Raid Forums
09
Mar
2026

Timeline of Failed Successors to Breach, Raid Forums

Race to the bottom Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the…

Michael Raypold, VP of Engineering
09
Mar
2026

Michael Raypold, VP of Engineering

1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address? Michael Raypold: The Flashpoint…

Hamas and PIJ on Telegram
09
Mar
2026

Hamas and PIJ on Telegram

Telegram: A crucial modern warfare channel Telegram, with its 700 million-plus-strong user base, has evolved into a pivotal communication hub…

09
Mar
2026

The 20 Coolest Web, Email And Application Security Companies Of 2026: The Security 100

From AI-powered vendors protecting email inboxes and web browsers, to providers of modern code security, here’s a look at 20…

CVE-2026-1731: Finding a critical RCE in an age of AI-driven vulnerability research
09
Mar
2026

CVE-2026-1731: Finding a critical RCE in an age of AI-driven vulnerability research

Introduction CVE-2026-1731 is an operating system (OS) command injection vulnerability impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)…

New threat actor, UAT-9921, leverages VoidLink framework in campaigns
08
Mar
2026

New threat actor, UAT-9921, leverages VoidLink framework in campaigns

Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in campaigns. Their activities may go as far back…

Fuzzing a single thread to uncover vulnerabilities
08
Mar
2026

Fuzzing a single thread to uncover vulnerabilities

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting…

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel
08
Mar
2026

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel

October 7: Hamas attacks Israel In the midst of the Israel-Hamas War, which erupted with a surprising and devastating attack…

Threat modeling AI applications | Microsoft Security Blog
08
Mar
2026

Threat modeling AI applications | Microsoft Security Blog

Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate every misuse or emergent behavior in AI systems….

Malicious AI Assistant Extensions Harvest LLM Chat Histories
08
Mar
2026

Malicious AI Assistant Extensions Harvest LLM Chat Histories

Microsoft Defender has been investigating reports of malicious Chromium‑based browser extensions that impersonate legitimate AI assistant tools to harvest LLM…