Articles tagged with: #threat-detection Clear filter
New PDF Tool to Detect Malicious PDF Using PDF Object Hashing Technique

New PDF Tool to Detect Malicious PDF Using PDF Object Hashing Technique

Cyber Security News cybersecuritynews.com

A new open-source tool called PDF Object Hashing is designed to detect malicious PDFs by analyzing their structural "fingerprints." Released by Proofpoint, the tool empowers security teams to create robust threat detection rules based on unique object characteristics in PDF files. This innovation addresses the growing reliance of threat actors on PDFs for delivering malware,

SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection

SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.16219v1 Announce Type: new Abstract: Malicious agents pose significant threats to the reliability and decision-making capabilities of Multi-Agent Systems (MAS) powered by Large Language Models (LLMs). Existing defenses often fall short due to reactive designs or centralized architectures which may introduce single points of failure. To address these challenges, we propose SentinelNet, the first decentralized framework for proactively detecting and mitigating malicious behaviors in...

Hierarchical Multi-Modal Threat Intelligence Fusion Without Aligned Data: A Practical Framework for Real-World Security Operations

Hierarchical Multi-Modal Threat Intelligence Fusion Without Aligned Data: A Practical Framework for Real-World Security Operations

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.15953v1 Announce Type: new Abstract: Multi-modal threat detection faces a fundamental challenge that involves security tools operating in isolation, and this creates streams of network, email, and system data with no natural alignment or correlation. We present Hierarchical Multi-Modal Threat Intelligence Fusion (HM-TIF), a framework explicitly designed for this realistic scenario where naturally aligned multi-modal attack data does not exist. Unlike prior work that assumes or...

Graylog Named in 2025 Gartner Magic Quadrant for SIEM

Graylog Named in 2025 Gartner Magic Quadrant for SIEM

Cyber Security - AI-Tech Park ai-techpark.com

Company delivers a powerful SIEM without complexity to midsize and large enterprises Graylog, a provider of SIEM and threat detection solutions, purpose-built to secure lean teams at scale, today announced its inclusion in the 2025 Gartner(R) Magic Quadrant(TM) for Security Information and Event Management. Graylog empowers security organizations to modernize...

Imprivata Acquires Verosint to Boost AI-Powered Access

Imprivata Acquires Verosint to Boost AI-Powered Access

Cyber Security - AI-Tech Park ai-techpark.com

Integration of Verosint Identity Threat Detection & Response with Imprivata Enterprise Access Management will strengthen the company's advanced and passwordless access strategy to bolster security, improve workflow efficiency, and drive ROI at enterprise scale Imprivata, a leading provider of access management solutions for healthcare and other mission-critical industries, today announced...