Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sponsored Post

Ten threats traditional Antivirus misses (and Next-Gen AV doesn't)

The cybersecurity arena is rapidly shifting and CISOs are locked in a relentless struggle against adversaries who rarely reveal themselves. Traditional antivirus (AV) solutions, which has been the primary shield (and still is for many companies) has reached its 'End of life'. The reason is clear: signature-based protection simply isn't enough anymore.

Breaking AppSec Myths - Obfuscated Packages

As part of the JFrog Security Research team’s ongoing work, we continuously monitor newly published packages across multiple ecosystems for malicious activity. This effort serves the broader open source community through public research disclosures, and it directly impacts the detection capabilities behind JFrog Xray and JFrog Curation. Our scanning pipeline uses a broad set of indicators to detect suspicious behavior.

SpiderLabs Ransomware Tracker Update January 2025: Qilin Continues as Dominant Threat Group

The January 2026 edition of LevelBlue SpiderLabs ransomware tracker noted a sharp fall in the number of attacks launched compared to December 2025. Qilin remained the top attacker, but there was a reshuffling of the remaining top five attackers for the month.

Inside Cloud Malware Analysis: Techniques and Real-World Use Cases

Cloud environments power modern business, but they also attract sophisticated malware. Attackers target cloud storage, virtual machines, and APIs to hide malicious code and steal sensitive data. This guide explains cloud malware analysis in clear terms. It covers key techniques and real examples to help security teams spot and stop these threats.

Emerging Ransomware Threat: Reverse Engineering the Green Blood Group Golang Payload

During routine Dark Web Monitoring activities, Our Threat Intelligence Team identified a newly active ransomware operation calling itself The Green Blood Group. The group operates a dedicated Tor-based leak site and follows a double-extortion model, threatening public disclosure of victim data when negotiations fail. The screenshot shown above captures the group’s Tor portal in its current state.

The Minimum Viable Hospital: Protecting Patient Care When Everything Is Offline

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell sits down with Dr. Sam Bhatia, Medical Director for Innovation in Microsoft’s Health & Life Sciences division. With a career that spans clinical practice, pathology-focused informatics, and global technology leadership, Dr. Bhatia brings a rare dual perspective on how hospitals can protect patient care when core systems fail. He breaks down how to define the Minimum Viable Hospital, why clinicians must shape recovery priorities, and how hybrid downtime models powered by AI can help health systems navigate the next decade of cyber disruptions.

Dawn Cappelli on the global threat environment

The gloves are off: the threat environment has escalated! Global conflicts have led to a surge in cyberattacks targeting critical infrastructure. Tune in to the latest episode of the Data Security Decoded podcast for a fantastic conversation with Dawn Cappelli that covers rising global tensions, the rapidly evolving threat landscape, and how to secure OT environments from bad actors. Subscribe to our channel and never miss an episode!