Threat Hunter TeamSymantecPosted: 25 May, 20235 Min ReadBuhti: New Ransomware Operation Relies on Repurposed PayloadsAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.Buhti: New Ransomware Operation Relies on Repurposed Payloads
Vijay NagarajanVice President, Wireless Connectivity Division, BroadcomPosted: 22 May, 20234 Min ReadA Conversation with Christie Simons and Saikat Pattadar of DeloitteConnected by BroadcomA Conversation with Christie Simons and Saikat Pattadar of Deloitte
Frank OstojicSenior Vice President and General Manager, ASIC Products Division, BroadcomPosted: 18 May, 20233 Min ReadAn Open Alternative in the Artificial Intelligence Silicon Era The rise of generative artificial intelligenceAn Open Alternative in the Artificial Intelligence Silicon Era
Alejandro LozaTechnical Director - Data Protection and Cloud - Symantec Enterprise Division of Broadcom SoftwarePosted: 16 May, 20236 Min ReadHow to Divest a Division Without Divulging Your DataHow customers can rely on Symantec DLP to protect information during business restructuring processesHow to Divest a Division Without Divulging Your Data
Threat Hunter TeamSymantecPosted: 15 May, 202319 Min ReadLancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other SectorsMerdoor backdoor is low prevalence and used in highly targeted attacks.Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors