[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
privacy
|
malware
|
research
|
vendor
]
Trend Micro Simply Security
U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
TrendAI Insight: New U.S. National Cyber Strategy
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads
The Real Risk of Vibecoding
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise
Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities
Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach
MISP Project
MISP v2.5.35: Decomposed Event Views, Overmind UI Enhancements, Security Hardening and MISP-STIX major update
Setting up UniqueSignal in MISP
MISP-STIX 2026.3.13 Released
MISP Workbench `v1.0` (beta) Released
Have You Ever Thought About Drones in MISP?
The Economic Power of Federated Threat Intelligence
MISP v2.5.33: Performance, Security, and the New Overmind Theme
FlowIntel 3.0.0 released and MISP integration
MISP architecture choices
MISP v2.5.32 released bringing new workflow capabilities, enhancement, security fix and various bugs fixed
Malware-Traffic-Analysis.net
2026-04-06: SmartApeSG activity
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)
X-Force Malware Reports
Dindoor Malware Profile
HijackLoader Malware Profile
HTTP_VIP Malware Profile
TGAmaranth RAT Analysis Report (XF0001847)
Hopmon Analysis Report (XF0001583)
CHAR Backdoor Malware Family Profile
JunkFiction Malware Profile
Interlock Ransomware Malware Profile
TookPS Malware Profile
VoidLink Malware Profile
Lenny Zeltser
When Executives Reject Your Security Recommendation
Designing Security Products for Humans and AI Agents
Awareness Training Won't Protect Employees from Their Own AI Tools
Security Governance at the Speed of Vibe Coding
Scope Security Assessments for Attack Paths, Not Org Charts
Understand the Reality of the SOC 2 Checkbox
Most Cybersecurity Products Aren't Platforms and It's OK
Build Better Security Product Strategies Using Your AI Tool
Competing in Endpoint Security: A Guide for Startups
Building Security Products for SMBs
© 2026 RiskDiscovery | Sponsored by:
Deception Logic