Category: EN

What is a mobile VPN?

A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks. This article has been indexed from Search Security Resources and Information from…

Bypassing AVs and EDRs With New Command-Line Obfuscation Technique

Researchers have uncovered advanced command-line obfuscation methods that allow attackers to bypass detection systems such as antivirus (AV) and endpoint detection and response (EDR) platforms.  The techniques, detailed in a comprehensive study released on March 24, 2025, exploit parsing inconsistencies…

Lumma Stealer – Tracking distribution channels

During incident response activities, our GERT team discovered Lumma Stealer in a customer’s infrastructure. Our experts conducted an investigation and analyzed its distribution scheme in detail. This article has been indexed from Securelist Read the original article: Lumma Stealer –…

Zero Trust Architecture – A Step-by-Step Guide for CISOs

Zero Trust Architecture (ZTA) has emerged as a critical security framework for organizations facing sophisticated threats from both external and internal vectors. In today’s rapidly evolving digital landscape, traditional security perimeters have dissolved as cloud adoption accelerates and remote work…