When it comes to cybersecurity, speed and accuracy are everything — especially in the financial sector, where targeted and industry-specific attacks are on the rise. For Northwestern Mutual, a leader in financial services, the challenge was clear: streamline their threat investigation process, minimize false positives, and ensure their incident response
Executive summary: The second half of 2024 shows how attackers are continuing to refine their tactics to target both organizations and individuals. The period saw substantial financial losses, including the continuation of ransomware extortions and large-scale phishing campaigns. High-profile incidents targeted major platforms like Facebook, GitHub, and LinkedIn, alongside government
Introduction SEO poisoning, also known as search poisoning, is a cyberattack technique where threat actors manipulate search engine algorithms to rank malicious websites higher in search results. These sites appear legitimate but serve malicious payloads, steal credentials, or facilitate phishing scams. This blog will explore how SEO poisoning works, its
Introduction DLL sideloading is a widely used attack technique that exploits how Windows applications load dynamic link libraries (DLLs). Threat actors use it to execute malicious payloads while evading traditional security measures. This post explores how this attack technique works, why it is attractive to attackers, and the best methods
In an era where cyber threats evolve faster than ever, organizations need more than raw data—they need actionable threat intelligence. This intelligence transforms overwhelming threat feeds into prioritized, contextual insights that cybersecurity teams can act on immediately. At VMRay, a leader in advanced malware sandboxing and context-rich threat intelligence, we
Staying ahead of adversaries requires more than just reactive defenses—it demands a proactive, intelligence-driven approach. Cyber threat intelligence (CTI) has become critical for identifying and mitigating risks from advanced threat actors. This is especially true for organizations facing targeted attacks. Let’s dive into the frameworks, tools, and strategies that empower
In today’s hyper-connected world, the digital transformation of businesses has significantly created an ever-expanding attack surface for cybercriminals. Moreover, with sophisticated malware, ransomware, and phishing campaigns on the rise, traditional security measures often fall short. Therefore, to effectively counter these threats, organizations are increasingly turning to Threat Intelligence Platforms (TIPs)—a
Introduction Phishing has been known as one of the leading initial attack vectors for a long time. Here at VMRay we are continuously monitoring phishing activities in order to keep our users protected from new and existing phishing threats. In the past few months, we discovered several new phishing campaigns
The cybersecurity landscape is evolving at an unprecedented pace. For organizations, keeping ahead of potential threats is no longer optional—it’s a necessity. Cybercriminals are becoming more sophisticated, using advanced techniques to evade detection and exploit vulnerabilities. In this environment, security teams face mounting pressures to stay proactive and focused. Threat
Updated on: 2025-02-13 Cybersecurity threats are becoming more complex, requiring proactive intelligence instead of basic defensive measures. Security teams can identify, understand, and mitigate potential threats with the aid of threat intelligence feeds. These feeds are collected from a variety of sources and provide security teams with real time data
Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!
Ready to stress-test your malware sandbox? Join us for a no-fluff, all-demo webinar that shows you real techniques to evaluate and optimize your sandboxing solution!