Recent supply chain attacks stayed live for hours. Automation tools silently merged their malware in minutes. Read how upgrade bots and AI agents became the insider threat.
You use your computer every day to work, shop, stream, and connect with the people and things you care about. But what exactly is a computer virus, and how does it manage to spread so fast? In this video, we explain what a computer virus is, how it attaches to files and programs you trust, and how it activates, copies itself, and spreads to other files and devices—just like a biological virus.
This report documents a direct operational link between the exposed infrastructure of Iranian threat actor MuddyWater and TAG-150 CastleRAT malware – a modular malware-as-a-service (MaaS) platform developed by Russian-speaking cybercriminals.
Are you ready to take control of your AI agents with Rubrik Agent Cloud? Traditional keyword filters aren't enough when agents are acting autonomously. You need a true AI governance engine to manage them effectively! SAGE is our semantic AI governance engine that allows you to define custom policies using natural language and block risky tools in real time. Ready to secure your autonomous agents? Dive into SAGE and learn more by checking out our website.
Windows 11 is better protected out of the box than older versions of Windows, but that does not solve the biggest problem most users face: recovery. If a phishing page slips through, ransomware starts encrypting files, or your SSD fails during an update, built-in protection can only take you so far. That is why the best antivirus for Windows 11 is no longer just the one that blocks malware most aggressively. It is the one that fits how you actually use your PC and what happens if something goes wrong.
Your CI pipeline enforces tests, security scans, and policy checks before code hits production. But your backups? Still running on a schedule, completely disconnected from your deployments. In this video, I'll walk you through how to use Rubrik's powerful APIs to build what I'm calling "Backup as Code": a GitHub Action that triggers an on-demand Rubrik snapshot of your GitHub repository every time code is merged into the main branch. We'll look at the action code, wire it up to a live repo, and watch the whole thing run end to end.
In a world where 80% of attacks exploit compromised credentials, your identity posture is your only real defense. Join us for a mockumentary tabletop where we stop blaming the humans and start fixing the identity architecture. Check out our website for more info.
On March 31, 2026, a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket variants. CrowdStrike Counter Adversary Operations attributes this activity to STARDUST CHOLLIMA with moderate confidence based on the adversary’s deployment of updated variants of ZshBucket (malware uniquely attributed to STARDUST CHOLLIMA) and overlaps with known STARDUST CHOLLIMA infrastructure.
On March 30-31, 2026, threat actors published two malicious versions of the popular HTTP library axios (versions 1.14.1 and 0.30.4) to the npm registry. Both versions included a new dependency named plain-crypto-js which, in its 4.2.1 release, contained a fully-featured cross-platform dropper that silently installed a Remote Access Trojan (RAT) on developer machines.