Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Polymorphic Viruses and Their Impact on Cybersecurity

A polymorphic virus is one of the hardest types of malware to detect because it can change into different forms. Because these advanced threats can modify their code in specific ways, they are very hard for standard signature-based antivirus systems to detect. Polymorphic viruses, on the other hand, use dynamic code encryption and mutation engines to alter their code structure, making them even harder to detect. The need for strong defenses has never been greater as hackers continue to use these methods.

Daniel dos Santos on defending against opportunistic cyberattacks

Complicated, targeted attacks aren’t the only methods you should be on the lookout for. Security fundamentals are important for defending against opportunistic that can cause chaos! On this episode of Data Security Decoded, Daniel dos Santos (VP of Research, Forescout Technologies) and host Caleb Tolin explore attacker motivations, common entry points, and what defenders must prioritize now. Listen to the full episode on our YouTube channel, or wherever you get your podcasts.

New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering

BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) continue to track an activity cluster that uses email bombing and IT-support impersonation over Microsoft Teams to obtain Quick Assist access, then pivot to a deeper attack. This research shows that once on the victim’s host, the actors sideload a malicious DLL to deliver a new backdoor BlueVoyant has dubbed the A0Backdoor.

VOID#GEIST: Stealthy MultiStage Python Loader with Embedded Runtime Deployment, Startup Persistence, and Fileless Early Bird APC Injection into explorer.exe

Securonix Threat Research analyzed a stealthy, multi-stage malware intrusion chain utilizing an obfuscated batch script (non.bat) to deliver multiple encrypted RAT shellcode payloads corresponding to XWorm, XenoRAT, and AsyncRAT.

Why Infostealers Are Central to Third-Party Breaches: A Look at the Top Malware Targeting Your Vendors

When threat actors compromise your vendors, they are rarely aiming for a single, isolated win. They are looking for leverage. Every third party represents a potential force multiplier: a trusted connection, a shared platform, a pathway into multiple downstream environments. We recently looked at the vulnerabilities that are most commonly being used against vendors, but vulnerabilities alone don’t tell the full story.

Rubrik Agent Cloud Explained!

AI agents are active across your enterprise, yet most teams lack visibility into their actions or access to them. This video introduces Rubrik Agent Cloud, offering a Centralized Registry for full agent visibility and Policy-based Governance to monitor and block unauthorized actions in real time. And for the rogue agent, quickly undo damage with Agent Rewind.

AI Moves Fast, Privacy Has to Move Faster with Ojas Rege

In this episode, Caleb Tolin welcomes Ojas Rege of OneTrust for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption. Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.

SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh

Between January 2025 and January 2026, Arctic Wolf tracked an extensive cyber espionage campaign that we assess was conducted by SloppyLemming (also known as Outrider Tiger and Fishing Elephant), an India-nexus threat actor, targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.

From Data Theft to Production Shutdown: The Top 3 Ransomware Threats Facing U.S. Manufacturers in 2026

The manufacturing sector remains one of the most aggressively targeted industries in the ransomware economy. In 2026, threat actors are no longer merely encrypting file servers-they are disrupting production lines, freezing ERP systems, and leveraging operational downtime as a strategic pressure point.