Resources

The Anomali Blog

Browse our library of upcoming and on-demand webinars, brochures and datasheets, industry reports and white papers, case studies, and more.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
November 22, 2022
Anomali Cyber Watch

Anomali Cyber Watch: URI Fragmentation Used to Stealthily Defraud Holiday Shoppers, Lazarus and BillBug Stick to Their Custom Backdoors, Z-Team Turned Ransomware into Wiper, and More

Read More
November 17, 2022
No items found.

Gartner Insights: How to Respond to the Cyberthreat Landscape

Read More
November 15, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Amadey Bot Started Delivering LockBit 3.0 Ransomware, StrelaStealer Delivered by a HTML/DLL Polyglot, Spymax RAT Variant Targeted Indian Defense, and More

Read More
November 9, 2022
No items found.

The Need for More Data in Security Operations

Read More
November 8, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Active Probing Revealed Cobalt Strike C2s, Black Basta Ransomware Connected to FIN7, Robin Banks Phishing-as-a-Service Became Stealthier, and More

Read More
November 8, 2022
Anomali

Modernize Your Security Operations & Reduce Cost

Read More
November 3, 2022
Cyber Threat Intelligence

Climbing the Threat Intelligence Maturity Curve

Read More
November 1, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Active Probing Revealed ShadowPad C2s, Fodcha Hides Behind Obscure TLDs, Awaiting OpenSSL 3.0 Patch, and More

Read More
October 26, 2022
Cyber Threat Intelligence
Anomali

Anomali Earns Frost and Sullivan Market Leadership Award for Threat Intelligence Management Platforms

Read More
October 25, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Daixin Team Ransoms Healthcare Sector, Earth Berberoka Breaches Casinos for Data, Windows Affected by Bring-Your-Own-Vulnerable-Driver Attacks, and More

Read More
October 20, 2022
Cyber Threat Intelligence

Threat Hunting: Eight Tactics to Accelerating Threat Hunting

Read More
October 18, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More

Read More