Tag: Research
-
Network ‘background noise’ may predict the next big edge-device vulnerability
Attackers rarely exploit an edge-device vulnerability indiscriminately. Typically, they first test how widely the flaw can be used and how …
-
NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities
The federal agency tasked with analyzing security vulnerabilities is overwhelmed as it and other authorities struggle to keep pace with a …
-
The State of Ransomware: March 2026
March saw 90 publicly disclosed ransomware attacks, marking the second month this year in which incidents exceeded 90. Organizations in the …
-
Researchers say credential-stealing campaign used AI to build evasion ‘at every stage’
A new malware-based credential-stealing campaign, which researchers are calling “DeepLoad,” has been infecting enterprise business IT …
-
Microsoft’s monthly Patch Tuesday is first in 6 months with no actively exploited zero-days
Microsoft addressed 83 vulnerabilities that cut across its broad portfolio of enterprise software and underlying services in its latest …
-
Microsoft: Hackers are integrating AI into every phase of operations
Microsoft reports that hackers are integrating AI into every phase of operations, from reconnaissance and phishing to malware development …
-
The State of Ransomware: February 2026
February recorded 82 publicly disclosed ransomware incidents, with healthcare emerging as the most targeted sector, accounting for 31% of …
-
New Research: 45% Cybersecurity Leaders Work a “Sixth Day”
According to new research, nearly half (45%) of cybersecurity leaders are working 11 or more extra hours per week — the equivalent of a …
-
Unit 42: Nearly two-thirds of breaches now start with identity abuse
The persistent pitfalls of identity extended beyond initial access, with an identity-related element playing a critical role in nearly 90% …
-
The State of Ransomware: January 2026
2026 opened with 91 publicly disclosed ransomware attacks. Healthcare was the most targeted sector with 27 incidents, followed by …
-
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
We analyze the recent Stan Ghouls campaign targeting organizations in Russia and Uzbekistan: Java-based loaders, the NetSupport RAT, and a …
-
Shadow AI Threat Grows Inside Enterprises as BlackFog Research Finds 60% of Employees Would Take Risks to Meet Deadlines
San Francisco, California, January 27th, 2026 – BlackFog, the leader in AI security and anti data exfiltration (ADX) technology, today …
●●●
