[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
privacy
|
malware
|
research
|
vendor
]
Trend Micro Simply Security
Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
Identity Protection in the AI Era
U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
TrendAI Insight: New U.S. National Cyber Strategy
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads
The Real Risk of Vibecoding
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
MISP Project
MISP v2.5.35: Decomposed Event Views, Overmind UI Enhancements, Security Hardening and MISP-STIX major update
Setting up UniqueSignal in MISP
MISP-STIX 2026.3.13 Released
MISP Workbench `v1.0` (beta) Released
Have You Ever Thought About Drones in MISP?
The Economic Power of Federated Threat Intelligence
MISP v2.5.33: Performance, Security, and the New Overmind Theme
FlowIntel 3.0.0 released and MISP integration
MISP architecture choices
MISP v2.5.32 released bringing new workflow capabilities, enhancement, security fix and various bugs fixed
Malware-Traffic-Analysis.net
2026-04-16: Files for an ISC diary (Lumma Stealer infection with Sectop RAT/ArechClient2)
2026-04-13: XLoader (Formbook) infection
2026-04-06: SmartApeSG activity
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
X-Force Malware Reports
Dindoor Malware Profile
HijackLoader Malware Profile
HTTP_VIP Malware Profile
TGAmaranth RAT Analysis Report (XF0001847)
Hopmon Analysis Report (XF0001583)
CHAR Backdoor Malware Family Profile
JunkFiction Malware Profile
Interlock Ransomware Malware Profile
TookPS Malware Profile
VoidLink Malware Profile
Lenny Zeltser
Scoring Your Security Product Strategy in the AI Era
How Modern Design Principles Strengthen Security
When Executives Reject Your Security Recommendation
Designing Security Products for Humans and AI Agents
Awareness Training Won't Protect Employees from Their Own AI Tools
Security Governance at the Speed of Vibe Coding
Scope Security Assessments for Attack Paths, Not Org Charts
Understand the Reality of the SOC 2 Checkbox
Most Cybersecurity Products Aren't Platforms and It's OK
Build Better Security Product Strategies Using Your AI Tool
© 2026 RiskDiscovery | Sponsored by:
Deception Logic