Perimeter Watch

We are the experts in digital security.

Scroll to see what we do.

Insights

01

May 7, 2026

Meet Mythos: The AI Changing the Rules of Cybersecurity

Mythos is an advanced AI system capable of finding software ...

02

April 23, 2026

Bridging the Gap Between AI Productivity and Secure Development

Artificial intelligence can improve efficiency by reducing t...

03

January 27, 2026

Quantum Computing and the Future of Encryption

Quantum computing applies the laws of quantum physics to inf...

04

December 31, 2025

Deepfakes, Vishing, and AI: The Next Frontier of Cyber Manipulation

Rather than targeting software flaws, many attackers focus o...

05

December 18, 2025

Cybersecurity for Utilities: Safeguarding the Backbone of Modern Society

06

November 20, 2025

Cybersecurity Challenges and Defense Strategies for Military Drones

07

September 2, 2025

Cybersecurity and Autonomous Vehicles

08

July 21, 2025

Multi-Stage PowerShell Attack Spreads NetSupport RAT

09

December 31, 2024

Google's Willow Quantum Chip and its Potential Threat to Current Encryption Standards

010

October 29, 2024

Raptor Train - IoT Botnet

011

July 12, 2024

MOVEit Transfer Exploitation

012

July 12, 2024

Google to Block Entrust Certificates in Chrome

Recently, Google officially announced that it will be blocki...

013

June 6, 2024

Malicious Python Package

014

June 6, 2024

Researchers have uncovered a major threat to the world of AI Models

Recently this year, cybersecurity researchers at Wiz Researc...

015

June 6, 2024

New TikTok Zero-Day Vulnerability Discovered

016

April 19, 2024

Black Cat Attack on UnitedHealth Group

017

March 15, 2024

Chinese Hackers Exploit FortiOS Vulnerability

018

February 14, 2024

The Dangers of GenAI

Since late 2022, artificial intelligence (AI) has been makin...

019

October 24, 2023

Las Vegas Casinos Targeted by Ransomware Attacks

Ever since the invention of internet browsers for personal c...

020

October 12, 2023

Job Hunt or Data Hunt? The Rise of Malicious Recruiters in Cyberspace

Hackers, whether they are working by themselves or part of a...

021

September 7, 2023

MMRat: A New Banking Trojan

Many threat actors tend to gravitate towards using some type...

022

September 7, 2023

DarkGate Malware Returns

In the past couple of months, researchers observed an uptick...

023

August 7, 2023

Biden’s IoT Cybersecurity Initiative

024

August 7, 2023

Unraveling The Decoy Dog Malware

025

August 7, 2023

FraudGPT and WormGPT: New Tools in a Cyber Criminal’s Arsenal

026

July 5, 2023

Anonymous Sudan

Anonymous Sudan, a hacker group that originated as a Russian...

027

July 5, 2023

Code Mirage

Code Mirage: How Cyber Criminals Harness AI-Hallucinated Cod...

028

June 5, 2023

Blacktail

Unveiling the Tactics of a Notorious Cybercrime Group

029

June 5, 2023

Volt Typhoon

Unraveling the Chinese Hacking Group "Volt Typhoon": A Globa...

030

April 10, 2023

OneNote

With the disablement of VBA macros, threat actors have turne...

031

March 8, 2023

Dridex

Dridex is a banking Trojan that is primarily used to steal s...

032

January 5, 2023

Gu-Loader

GuLoader is an advanced malware downloader that is used by c...

033

December 7, 2022

Raccoon Infostealer

Raccoon Stealer was first observed in 2019 and caught everyo...

034

November 7, 2022

Vice Society

Vice Society is a ransomware group that initially appeared i...

035

November 4, 2022

Typo-squatting

036

October 5, 2022

Metador

A fairly new hacker group known as “Metador” has recently st...

037

October 5, 2022

NullMixer

Nullmixer is a new malware dropper that gives us another rea...

038

August 2, 2022

Malware Evasion Techniques

039

August 2, 2022

Denial of Service Attacks

A denial-of-service attack (DoS attack) is a cyber-attack in...

040

July 4, 2022

What is Beaconing?

041

July 4, 2022

CanaryTokens

042

June 2, 2022

Top Ten Web Application Vulnerabilities Pt. 2

Web Applications are an attackers first choice when trying t...

043

June 2, 2022

TrickBot

044

May 3, 2022

A Switch From the Norm - A New Malware Infection Chain

Microsoft started to disable Excel 4.0 macros by default at ...

045

May 3, 2022

Fancy Bear

046

April 1, 2022

Lapsus$

A new player in the ransomware circle has continued to targe...

047

April 1, 2022

Top 10 Web Application Vulnerabilities Pt. 1

Web Application’s are an attackers first choice when trying ...

048

April 1, 2022

Suspected UNC 1151 Attacks as Ukraine Conflict Continues

049

March 2, 2022

BlackCat Ransomware

A ransomware group using Rust programming language and with ...

050

March 2, 2022

The Anatomy of a Cyber Attack

The rate of cyber-attacks has escalated exponentially in the...

051

February 2, 2022

#LeakTheAnalyst

The group responsible for hacking Mandiant analyst back in 2...

052

February 1, 2022

A New Campaign From Lazarus Group

Lazarus Group (also known by other monikers such as Zinc, HI...

053

January 3, 2022

The Return of Emotet

In early 2021, an international law enforcement operation co...

054

January 3, 2022

Introduction to Threat Modeling

The attack and defense sides of security are constantly chan...

055

December 3, 2021

Yanluowang Ransomware

056

December 13, 2021

The Downfall of REvil

One of the most infamous ransomware gangs, REvil, may have b...

057

November 3, 2021

Lockbit 2.0

While Darkside may have rebranded as BlackMatter and REvil t...

058

November 3, 2021

Do You Need an MDR Solution?

Malware and Ransomware is only getting more complex over tim...

059

August 17, 2021

BlackMatter - A Possible Successor to Darkside and REvil

After the disappearance of two of the top ransomware gangs, ...

060

August 19, 2021

Prometheus TDS – A Whole New Cybercrime Ecosystem

A new cybercrime service is being offered on the DarkWeb to ...

061

August 15, 2021

Conti Ransomware

The case for a defense in depth approach to securing our net...