The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™...
Sep 06, 2025Ravie LakshmananSoftware Security / Cryptocurrency
A new set of four malicious packages have been discovered in the npm package registry with capabilities to...
IT threat evolution in Q2 2025. Mobile statisticsIT threat evolution in Q2 2025. Non-mobile statistics
The mobile section of our quarterly cyberthreat report includes statistics...
When I am thinking about the security of manufacturing environments, I am usually focusing on IoT devices integrated into production lines. All the little...
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction...
Spanish police have arrested a suspected hacker for accessing a government website in order to alter the high school and university entrance exam grades...
In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response...