News

SECURITY. COM
security. com > blog-post > harvester-new-linux-backdoor-gogra

Harvester: APT Group Expands Toolset With New Go Gra Linux Backdoor

1+ hour, 38+ min ago  (569+ words) The Harvester APT group has developed a new, highly-evasive, Linux version of its Go Gra backdoor. The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses....

SECURITY. COM
security. com > expert-perspectives > ai-increases-load

How AI Increases the Load on Security Teams

1+ day, 1+ hour ago  (875+ words) The more I thought about it, it dawned on me that this was about to happen on a much faster, larger scale in novel ways. What does that mean for security teams? Possibly safer open source in the long run,…...

SECURITY. COM
security. com > feature-stories > enterprise-grade-security-all-2026

Enterprise-Grade Security For All in 2026

1+ week, 1+ day ago  (236+ words) These organizations certainly don't lack the determination or the gumption to be ruthless defenders. What they lack is an advantage against advanced, persistent threats. Security leaders across industries are being asked to defend increasingly complex environments without the staff, budget,…...

SECURITY. COM
security. com > expert-perspectives > symantec-cbx-media-recap

Symantec CBX Through the Paparazzi Lens

2+ week, 4+ day ago  (473+ words) We came to RSAC" 2026 Conference aiming to challenge the industry and offer something critical to a historically under-served market. Proud to say, the Symantec CBX announcement delivered. From media interviews to the nonstop buzz around CBX, leaders like Jason Rolleston…...

SECURITY. COM
security. com > feature-stories > us-navy-case-study

The U. S. Navy's Playbook for Cost-Controlled, Reliable Cybersecurity

3+ week, 1+ hour ago  (763+ words) As government agencies modernize their cybersecurity stacks, many are discovering go-to, cloud-first security tools don't always meet the needs of their mission-critical or air-gapped environments. The U. S. Navy recently confronted this reality in their own security stack. The Navy's experience reflects…...

SECURITY. COM
security. com > blog-post > resilient-channel-series-part-1

The Modern Threat Landscape and The Partner's New Burden

3+ week, 21+ hour ago  (464+ words) The shift from traditional resale to cyber resilience marks a fundamental transformation in how businesses manage risk. Older resale models characterised by manual inventory flips, physical-first marketplaces, and "patch-and-pray" approaches to security can no longer survive the speed and scale…...

SECURITY. COM
security. com > expert-perspectives > next-identity-shift

The Next Identity Shift

3+ week, 5+ day ago  (653+ words) Twenty-five years ago, the industry faced a fundamental shift when enterprise applications moved to the web. At the time, many organizations assumed each application would simply handle its own authentication and authorization. It didn't take long to realize that model…...

SECURITY. COM
security. com > expert-perspectives > cyber-legends-bts-cbx

Cyber Legends: Behinds the Scenes of CBX

3+ week, 6+ day ago  (542+ words) We saw that opportunity and then looked at what we could offer: Carbon Black's EDR and threat hunting capabilities, combined with Symantec's endpoint protection, network security defenses, and core data protection. Building a unified solution that brings all these capabilities…...

SECURITY. COM
security. com > threat-intelligence > asyncrat-libya-oil-cyberattack

Libyan Oil Refinery Among Targets in Long-running Likely Espionage Campaign

1+ mon, 2+ day ago  (293+ words) A series of attacks on Libyan organizations hit an oil refinery, a telecoms organization and a state institution between November 2025 and February 2026. These attacks delivered the Async RAT backdoor, which is a publicly available backdoor that has previously been used…...

SECURITY. COM
security. com > blog-post > repatriating-iam-part-4

As Identity Takes Control, Telecom Needs Repatriated IAM Capable of Keeping Up

1+ mon, 5+ day ago  (852+ words) This identity access management (IAM) blog series continues to shine the spotlight on a new reality that just keeps getting more real: Identity isn't the front door anymore. It's the control plane. Earlier in the series we looked at how…...