Resources

The Anomali Blog

Browse our library of upcoming and on-demand webinars, brochures and datasheets, industry reports and white papers, case studies, and more.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
November 29, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Caller-ID Spoofing Actors Arrested, Fast-Moving Qakbot Infection Deploys Black Basta Ransomware, New YARA Rules to Detect Cobalt Strike, and More

Read More
November 22, 2022
Anomali Cyber Watch

Anomali Cyber Watch: URI Fragmentation Used to Stealthily Defraud Holiday Shoppers, Lazarus and BillBug Stick to Their Custom Backdoors, Z-Team Turned Ransomware into Wiper, and More

Read More
November 17, 2022
No items found.

Gartner Insights: How to Respond to the Cyberthreat Landscape

Read More
November 15, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Amadey Bot Started Delivering LockBit 3.0 Ransomware, StrelaStealer Delivered by a HTML/DLL Polyglot, Spymax RAT Variant Targeted Indian Defense, and More

Read More
November 9, 2022
No items found.

The Need for More Data in Security Operations

Read More
November 8, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Active Probing Revealed Cobalt Strike C2s, Black Basta Ransomware Connected to FIN7, Robin Banks Phishing-as-a-Service Became Stealthier, and More

Read More
November 8, 2022
Anomali

Modernize Your Security Operations & Reduce Cost

Read More
November 3, 2022
Cyber Threat Intelligence

Climbing the Threat Intelligence Maturity Curve

Read More
November 1, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Active Probing Revealed ShadowPad C2s, Fodcha Hides Behind Obscure TLDs, Awaiting OpenSSL 3.0 Patch, and More

Read More
October 26, 2022
Cyber Threat Intelligence
Anomali

Anomali Earns Frost and Sullivan Market Leadership Award for Threat Intelligence Management Platforms

Read More
October 25, 2022
Anomali Cyber Watch

Anomali Cyber Watch: Daixin Team Ransoms Healthcare Sector, Earth Berberoka Breaches Casinos for Data, Windows Affected by Bring-Your-Own-Vulnerable-Driver Attacks, and More

Read More
October 20, 2022
Cyber Threat Intelligence

Threat Hunting: Eight Tactics to Accelerating Threat Hunting

Read More