Threat Hunter TeamSymantec and Carbon BlackPosted: 12 Jun, 20258 Min ReadFog Ransomware: Unusual Toolset Used in Recent AttackLegitimate employee monitoring software and various pentesting tools deployed.Fog Ransomware: Unusual Toolset Used in Recent Attack
Adarsh ShettyProduct Manager, Enterprise Security Group, BroadcomPosted: 10 Jun, 20255 Min ReadThe Next Move Problem: Why Detection Alone Isn’t Enough AnymoreToday’s threats don’t stop after the first move—neither should your defensesThe Next Move Problem: Why Detection Alone Isn’t Enough Anymore
Prateek TemkarSenior Director of Product Management, SymantecPosted: 6 Jun, 20255 Min ReadRead This Before Adopting AIHow to keep your data safe before activating tools like CopilotRead This Before Adopting AI
Enterprise Security Groupby BroadcomPosted: 5 Jun, 20255 Min ReadMeet the Threat Hunters Who Alert Security Teams To What’s ComingExtensive intel and expert analysis make our Threat Hunters a key component in protecting organizations from today’s critical threatsMeet the Threat Hunters Who Alert Security Teams To What’s Coming
Yuanjing GuoSoftware EngineerPosted: 5 Jun, 20254 Min ReadUnmasking Insecure HTTP Data Leaks in Popular Chrome ExtensionsExtensions analyzed expose information such as browsing domains, machine IDs, OS details, usage analytics, and more.Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions