Skip to main content
Mallory
Back to intelligenceLive intel

Trending Organizations

The organizations the security industry is discussing right now. Ranked by mention velocity across breach reports, vendor advisories, and threat intelligence — refreshed continuously.

Ranked by Mallory's mention-velocity model across sources.

Mention map — Last week

Sized by mentions
Tile size: mentions · Color: mention volume·HighestHighMediumLowLowest

Top 24 organizations — Last week

#1Microsoft Corporation
Software Vendor

Microsoft Corporation is a multinational technology company best known as Microsoft. Based on the provided content, it develops and operates a broad portfolio of software, cloud, productivity, identity, security, and developer products and services, including Windows, Microsoft 365, Azure, Entra ID, Defender, Teams, Outlook, OneDrive, SharePoint, Visual Studio Code, Microsoft Graph, and related security and research organizations such as MSRC and MSTIC. The content also reflects Microsoft’s ownership of GitHub. Security-relevant activity directly mentioned in the content includes Microsoft’s disruption of the Fox Tempest malware-signing-as-a-service operation, which abused Microsoft Artifact Signing to fraudulently obtain short-lived code-signing certificates and sign malware used in ransomware and infostealer campaigns affecting healthcare, education, government, and financial-sector organizations across multiple countries. Microsoft also acknowledged and issued mitigations for the YellowKey BitLocker bypass vulnerability (CVE-2026-45585) affecting Windows 11 and Windows Server 2025, and published a CVE entry for a heap-based buffer overflow in Microsoft Defender (CVE-2026-45584). The content further states that Microsoft confirmed a compromise of its official durabletask Python SDK on PyPI, where malicious versions 1.4.1 through 1.4.3 were uploaded using legitimate publishing credentials outside the normal GitHub release pipeline, and that the affected versions were subsequently yanked. In addition, Microsoft-owned GitHub disclosed a breach involving exfiltration of internal repositories after a developer device was compromised through a poisoned Visual Studio Code extension; GitHub stated the incident was contained and that it had no evidence of customer-data impact outside the affected internal repositories.

Mentions239HQUS
#2Google
Corporation

Google is a major U.S.-based technology company referenced across the content in connection with consumer products, cloud services, AI, and cybersecurity research. The aliases and mentions indicate it encompasses Google Cloud, Google Cloud Platform (GCP), Google Workspace, Gmail, Chrome/Chromium, Android, YouTube, DeepMind, Project Zero, Mandiant, Google Threat Intelligence, and the Google Threat Analysis Group. The content specifically references Google Cloud and Google Kubernetes Engine, Chrome Enterprise, Google Workspace, Google Ads, Google’s Kaggle Notebooks, Google Quantum AI, and Gemini-related products including Gemini API and Gemini CLI. Security-relevant references include Google Threat Intelligence tracking TeamPCP as UNC6780; Google announcing on May 11, 2026 that it detected the first known case of a major cybercrime group using AI to discover a previously unknown software flaw and plan mass exploitation; Google DeepMind developing CodeMender, an AI code security agent; and Google introducing and expanding Antigravity as an agent platform with security features integrated into its AI Threat Defense offering. The content also notes Google as a named participant in Anthropic’s Project Glasswing and mentions claims by ShinyHunters of a breach involving Google, but no confirmed incident details about Google itself are provided in the content. No high-confidence employee count or headquarters location is directly stated in the provided material.

Mentions176HQUS
#3GitHub
Corporation

GitHub is a developer platform and code hosting service owned by Microsoft. The content describes it as the world’s biggest code repository and DevOps platform, central to software production for companies, governments, open-source maintainers, and independent developers, and notes reporting that it hosts code for more than 100 million developers worldwide. Security-relevant activity in the content centers on a May 2026 breach in which GitHub said attackers exfiltrated internal repositories after compromising an employee device through a poisoned Visual Studio Code extension. GitHub stated it detected and contained the incident, removed the malicious extension version, isolated the affected endpoint, rotated critical secrets and credentials, and launched an incident response investigation. Its assessment at the time was that the activity involved GitHub-internal repositories only, with attacker claims of roughly 3,800 repositories affected described as directionally consistent with the investigation, and no evidence that customer data stored outside the affected internal repositories or infrastructure outside internal networks was compromised. Multiple reports in the content attribute the intrusion to TeamPCP, though GitHub itself had not publicly attributed the activity in the cited material. Separately, the content also references GitHub as infrastructure abused by threat actors to host staged malware, tools, indicators of compromise, attacker-created public repositories for exfiltration, and malicious or compromised GitHub Actions workflows in broader software supply chain campaigns.

Mentions161Industry4510
#4Deutsche Telekom Security GmbH
Corporation

Deutsche Telekom Security GmbH is an organization identified in the provided content by repeated copyright notices: "Copyright © 1999-2026 Deutsche Telekom Security GmbH. All rights reserved." Based on the name alone, it appears to be a security-focused company operating under the Deutsche Telekom brand. No high-confidence details about its industry segment, size, headquarters location, specific services, or notable security incidents are directly provided in the content. The available evidence only supports that Deutsche Telekom Security GmbH is the named organization associated with the referenced material.

Mentions107Industry4510
#5Amazon Web Services
Corporation

Amazon Web Services (AWS) is Amazon’s cloud computing platform and is widely referenced in the provided content through services and products such as Amazon S3, Amazon Inspector, SageMaker, EC2, Systems Manager (SSM), IAM, EKS, and Amazon Braket. The content identifies AWS as a major hyperscale public cloud provider alongside Microsoft Azure and Google Cloud, and as a commercial platform used for cloud infrastructure, storage, machine learning, and quantum computing services. Security-relevant references in the content include multiple incidents and abuse cases involving AWS services or credentials: ESET reported that the China-aligned threat group Webworm used a compromised Amazon S3 bucket to retrieve proxy configurations and likely exfiltrate stolen data, including files from European government victims; several reports described exposed or stolen AWS credentials in public repositories, including alleged CISA-related administrative credentials; and malware campaigns discussed in the content targeted AWS IAM credentials and propagated via AWS Systems Manager across EC2 environments. AWS also appears in defensive and governance contexts, including Amazon Inspector advisories, AWS Customer Incident Response Team guidance on attackers abusing the organizations:LeaveOrganization permission to evade centralized controls, and AWS acceptable-use restrictions inherited by Amazon Braket.

Mentions91HQUS
#6Anthropic
Corporation

Anthropic is an artificial intelligence company and frontier AI lab best known for the Claude family of models, including Claude Code and the cybersecurity-focused Claude Mythos Preview / Mythos. The content identifies Anthropic as one of the largest engines of AI innovation alongside Google and OpenAI, and describes it as a private-sector firm developing advanced general-purpose and cybersecurity-capable large language models. Its products and research are referenced in contexts including AI coding assistance, cybersecurity research, model safety, and government and enterprise use. The organization is associated with research published with the UK AI Security Institute and the Alan Turing Institute on poisoned training data and LLM backdooring. Security-relevant activity in the content centers on Anthropic’s cybersecurity models and government relationships. Anthropic’s Mythos model is described as an advanced cybersecurity-focused AI model that reportedly found thousands of vulnerabilities across major operating systems and browsers, and was deployed in a controlled defensive initiative called Project Glasswing. Named participants in Project Glasswing included major technology and telecom firms such as AWS, Broadcom, Cisco, Google, Microsoft, Nvidia, Palo Alto Networks, IBM, Verizon, AT&T, and Cloudflare. Anthropic also partnered with Verizon to study threat actor use of AI, with Verizon citing data from Anthropic’s Safeguards Team. The content also describes a significant U.S. national security and legal dispute involving Anthropic. The Pentagon designated Anthropic a supply-chain risk and barred it from future military work, while allowing most non-defense government and commercial use to continue. Anthropic challenged that designation in court; Judge Rita Lin of the U.S. District Court for the Northern District of California granted a preliminary injunction for Anthropic on March 26, while a separate D.C. Circuit proceeding considered the Pentagon’s authority to maintain the restriction. The dispute reportedly relates to Pentagon concerns over Anthropic’s model-use restrictions and military operational trust, while Anthropic states its restrictions apply to fully autonomous lethal weapons and mass domestic surveillance. The content further notes that Anthropic had previously worked with the Pentagon on intelligence analysis, modeling and simulation, operational planning, and cyber operations.

Mentions84Industry4510
#7Openai
Corporation

OpenAI is an artificial intelligence company and one of the largest private-sector engines of AI innovation, frequently discussed alongside Anthropic and Google. The content associates OpenAI with products and models including ChatGPT, GPT-4, GPT-5.5, and GPT-5.5-Cyber, and notes that some European authorities and companies were given access to its GPT-5.5-Cyber model. OpenAI is led by CEO Sam Altman. Security-relevant reporting in the content says OpenAI was affected by recent software supply-chain activity attributed to TeamPCP, including the TanStack/Mini Shai-Hulud campaign. According to the content, two OpenAI employee devices were compromised, code-signing certificates were exfiltrated, and compromised credentials were tied to internal developer workflows and projects including ChatGPT Desktop, Codex App, Codex CLI, and Atlas. OpenAI stated in that incident that its production systems were not compromised. The content also references OpenAI as a target in a separate but similar attack and as a participant in government and national-security AI discussions, including Pentagon agreements with OpenAI and access provided to European authorities for cyber-focused model evaluation.

Mentions76Industry4510
#8Apple
Corporation

Apple is a major technology company commonly referred to as Apple or Apple Inc. The content associates it with consumer hardware and software products and services including iPhone, macOS, iCloud, the App Store, Apple TV+, Apple Podcasts, AirPods, and Apple gift cards. Security-relevant activity directly mentioned includes Apple’s publication of 2025 App Store trust and safety metrics: it said its App Review team evaluated more than 9.1 million App Store submissions, rejected more than 2 million submissions for guideline violations, terminated 193,000 developer accounts over fraud concerns, prevented more than $2.2 billion in potentially fraudulent transactions, and blocked nearly 195 million fraudulent reviews and ratings. The content also notes that fraudulent or deceptive apps can still sometimes bypass Apple’s review process. Additional security-related references include Apple opposing a Canadian bill it said could require backdoor access to encrypted user data, expanding default end-to-end encryption for Android-iPhone conversations with Google, participating in Anthropic’s Project Glasswing security partnership, and being referenced in reporting on macOS protections and malware impersonation of Apple security updates. Fraud-related reporting in the content says Apple worked with police on a gift-card fraud investigation and determined that 46,364 Apple products worth $47 million were shipped to a warehouse in Windham, New Hampshire during a 10-week period, with another facility receiving $35 million in iPhones. The content also mentions Apple as one of the private donors funding a planned White House ballroom project and as an enterprise cited in discussion of Valkey adoption. High-confidence details such as headquarters, employee count, or exact size are not provided in the content.

Mentions61HQUS
#9Cisco Systems
Software Vendor

Cisco is a major technology and networking company referenced across the content through product, business unit, and brand aliases including Cisco, Cisco Systems, Cisco Talos, Meraki, Duo Security, AnyConnect, PSIRT, and Webex. The content shows Cisco publishing multiple security advisories on May 20, 2026, including for Cisco Secure Workload and Cisco ThousandEyes Enterprise Agent, and separately issuing guidance and fixes for Cisco Catalyst SD-WAN vulnerabilities. Cisco PSIRT is cited as the source of product vulnerability disclosures, while Cisco Talos is referenced as Cisco’s threat intelligence and detection arm publishing Snort and ClamAV coverage and analysis such as reporting on BadIIS malware. The organization is also described as participating in Anthropic’s Project Glasswing, with Cisco executive Anthony Grieco identified as senior vice president and chief security and trust officer. Security-relevant mentions include Cisco advisories for CVE-2026-20223 in Cisco Secure Workload, active-exploitation reporting around Cisco Catalyst SD-WAN flaws including CVE-2026-20182, and external claims in news reporting that ShinyHunters recently claimed a breach involving Cisco. The provided content does not directly state Cisco’s headquarters, employee count, or exact size.

Mentions46HQUS
#10VulnCheck
Corporation

VulnCheck is a cybersecurity organization focused on vulnerability intelligence, vulnerability disclosure, and security research. The content shows it acting as a CVE Numbering Authority (CNA), assigning CVEs and receiving disclosures via disclosure@vulncheck.com, and publishing advisories on vulncheck.com. Its researchers, including Patrick Garrity, are cited for reporting active exploitation of vulnerabilities such as CVE-2026-42945 affecting NGINX, and the organization operates canary systems used to detect exploitation activity. The content also references VulnCheck research on known exploited vulnerabilities, including a finding that 32.1% of KEV entries had evidence of exploitation on the same day as or before CVE publication. No high-confidence information about headquarters location or organization size is provided in the content.

Mentions40Industry4510
#11Mozilla
Non Profit

Mozilla is the organization behind the Firefox web browser and related products including Firefox ESR, Firefox VPN, and Thunderbird. The content describes Mozilla as operating under a foundation-controlled structure in which the Mozilla Foundation is a non-profit organization and the Mozilla Corporation is its for-profit subsidiary. Mozilla is widely associated with open-source software, particularly Firefox, which is described in the content as an open-source web browser focused on standards compliance, performance, and portability. Security-relevant activity directly mentioned in the content includes Mozilla’s publication of multiple security advisories on May 19, 2026 for Firefox and Firefox ESR, covering vulnerabilities fixed in Firefox 151, Firefox ESR 115.36, and Firefox ESR 140.11. The content also references specific Mozilla-reported CVEs affecting Firefox, including same-origin policy bypasses, a sandbox escape, integer overflow, and numerous memory-safety bugs, some potentially leading to arbitrary code execution. Mozilla is also noted as having collaborated with Discord to resolve a Firefox compatibility issue during Discord’s rollout of end-to-end encryption for voice and video across platforms.

Mentions37Industry4510
#12Security Affairs
Independent Media

Security Affairs is a cybersecurity news and analysis publication. The provided content repeatedly cites it as a reporting source for topics including vulnerabilities, malware, cybercrime, data breaches, telecom incidents, government cyber policy, and threat actor activity. It is associated in the content with author Pierluigi Paganini, including bylines such as "Pierluigi Paganini (SecurityAffairs – hacking, ...)" and reports attributed to Security Affairs. Based on the content, the organization functions as a media outlet covering security incidents and research rather than as a victim organization. No high-confidence information about its size, headquarters location, or ownership is directly stated in the provided content.

Mentions36Industry9130
#13X
Corporation

X, formerly Twitter, is a major social media platform. The provided content explicitly refers to it as "X (formerly Twitter)" and mentions it alongside other large technology companies such as Meta and Google. The content also notes that the European Commission opened formal proceedings against X over suspected failures in content moderation, transparency reporting, and deceptive interface design. Separately, the FTC is described as having sent enforcement letters to major tech companies including X regarding compliance expectations under the Take It Down Act. The content further states that X users have access to the Grok AI service and references an incident in which Grok was used to flood the platform with nonconsensual sexualized deepfakes of real people. No high-confidence details about headquarters, employee count, or exact organizational size are provided in the source content.

Mentions35Industry5020
#14Nvidia
Company

NVIDIA is a semiconductor and AI technology company best known for GPUs, AI accelerators, and related software and infrastructure. The content identifies it as a major supplier of gaming GPUs and data-center AI chips, with products referenced including the RTX 5090D V2, H100, H200, H20, GPU display drivers, Triton Inference Server, the NVIDIA Container Toolkit, and NVIDIA drivers used in Ubuntu Core packaging. It is also referenced in connection with AI ecosystem and government activity, including participation in Anthropic’s Project Glasswing, contributions to the OpenSSF AI/ML Working Group’s 2025 model-signing specification, and Pentagon agreements with AI companies including NVIDIA. Security-relevant items directly mentioned in the content include multiple vulnerabilities in NVIDIA GPU Display Drivers that could enable privilege escalation, data manipulation, information disclosure, denial of service, or code execution; an authentication bypass vulnerability in NVIDIA Triton Inference Server with potential downstream impacts including code execution, privilege escalation, data tampering, denial of service, and information disclosure; and a successful exploit of the NVIDIA Container Toolkit at Pwn2Own Berlin 2026. The content also repeatedly places NVIDIA at the center of U.S.-China export-control and supply-chain issues, including reports about China-focused RTX 5090D V2 restrictions, U.S. clearance of limited H200 sales to selected Chinese firms, and alleged smuggling or diversion of banned NVIDIA GPUs to China through intermediaries.

Mentions33HQUS
#15Meta Platforms
Corporation

Meta, formally referenced in the content as Meta Platforms and Meta Platforms, Inc., is a major U.S. technology company best known for operating Facebook, Instagram, WhatsApp, Threads, and AI products such as Meta AI and the Llama model family. The provided aliases and mentions also associate the organization with Workplace from Meta, Meta Ads, Meta Pixel, React, and WhatsApp LLC/Inc. The content describes Meta as a prominent social media and AI provider whose platforms are widely impersonated in cybercrime, including Android malware campaigns masquerading as Facebook Messenger and Instagram Threads apps and phishing operations that compromised more than 30,000 Facebook accounts. Security-relevant references in the content include criticism following Meta’s removal of end-to-end encryption from regular Instagram direct messages, a March 2026 internal incident in which an AI agent posted incorrect guidance that contributed to sensitive data being exposed for nearly two hours, and reporting that threat actors can deploy Meta’s open-source Llama models on privately controlled infrastructure to bypass safeguards. The content also notes Meta’s role in advertising abuse, with illegal betting lead-generation services using Meta Ads, and mentions a Meta-backed undersea cable project intended to expand internet service across Africa that was suspended amid regional cable disruption. Additional high-confidence details from the content include Meta’s partnership with Google to improve Instagram on Android 17 and Meta’s announcement of Incognito Chat with Meta AI for WhatsApp and the Meta AI app using WhatsApp Private Processing.

Mentions33HQUS
#16Linkedin
Software Vendor

LinkedIn is a business-focused social media platform referenced in the content as Microsoft’s business-focused social media site. It appears in multiple contexts as a social channel (“Follow us on Google News, LinkedIn, and X”) and in a security-relevant example involving AI-assisted recruiter outreach. The content specifically describes LinkedIn profiles being scanned by recruiter AI systems and cites a prompt-injection example placed in a user’s LinkedIn profile “About Me” section that reportedly altered at least one recruiter message. No high-confidence details about company size, headquarters location, or specific breach incidents affecting LinkedIn itself are directly provided in the content.

Mentions29Industry5020
#17Rapid7
Corporation

Rapid7 is a cybersecurity company and the organization behind the Metasploit project, with public development activity visible across repositories such as metasploit-payloads, mettle, and Metasploit Framework. The provided content shows Rapid7 personnel and contributors working on offensive security tooling and framework features, including Malleable C2 support, stageless payload support, persistence modules, SSH-related functionality, and bug fixes in Metasploit. Rapid7 is also represented in vulnerability research and incident-response contexts: researchers Jonah Burgess and Stephen Fewer of Rapid7 are credited with discovering and reporting Cisco Catalyst SD-WAN vulnerability CVE-2026-20182, and Rapid7 published a public Metasploit module demonstrating exploitation. The content further identifies Rapid7 researchers as investigating related Cisco SD-WAN flaws and references Douglas McKee as Rapid7’s director of vulnerability intelligence. Rapid7 researchers also participated in Pwn2Own Berlin 2026, where Stephen Fewer attempted a Microsoft SharePoint exploit. No headquarters location, employee count, or organization size is directly stated in the content.

Mentions26Industry4510
#18Red Hat
Corporation

Red Hat is an enterprise software company best known for Red Hat Enterprise Linux (RHEL) and related products including Red Hat OpenShift, Red Hat OpenShift Data Foundation, Red Hat Build of Debezium for Red Hat Application Foundations, Red Hat CodeReady Linux Builder, and Red Hat Enterprise Linux for Real Time. The content also references Red Hat Product Security and Red Hat security advisories, indicating an established product security and vulnerability response function. Red Hat products are discussed repeatedly in Linux and cloud infrastructure contexts, including RHEL 9, Fedora-related ecosystem references, and support as an endorsed Linux distribution on Azure. Security-relevant activity directly mentioned in the content includes Red Hat publishing multiple security advisories between May 11 and 17, 2026 for vulnerabilities affecting several products, including Linux kernel issues across multiple Red Hat offerings. The content also references vulnerabilities affecting Red Hat products such as Red Hat OpenShift Data Foundation and mentions Red Hat Enterprise Linux and Red Hat Enterprise Linux for Workstations as targets in Pwn2Own Berlin 2026 privilege-escalation demonstrations. Additionally, the content mentions Red Hat Product Security in the context of CVE coordination and researcher interaction over vulnerability reporting.

Mentions26Industry4510
#19BleepingComputer
Independent Media

BleepingComputer is a cybersecurity news and information organization. The provided content shows it is widely cited for reporting on security vulnerabilities, malware, threat actors, software supply-chain incidents, data breaches, scams, and vendor security advisories across products and platforms including Microsoft Windows, GitHub, Discord, WordPress, ChromaDB, JDownloader, and Canvas. It publishes original reporting and follow-up coverage, including direct outreach to vendors and organizations for comment, and is referenced by other sources for details on incidents such as the Instructure/Canvas breach, GitHub repository theft claims, Windows update failures, ChromaDB RCE reporting, and emerging malware such as REMUS. The content does not provide high-confidence details about its size, headquarters location, or corporate structure beyond the alias "bleeping_computer_llc."

Mentions24Industry5020
#20Verizon Communications
Corporation

Verizon Communications is a major U.S. telecommunications company and mobile carrier, commonly referred to as Verizon or VZ. The content also references Verizon Business and Verizon Enterprise Solutions as parts of the organization’s business operations. Verizon is repeatedly cited as the publisher of the annual Data Breach Investigations Report (DBIR), including the 19th edition released in 2026, which analyzed more than 31,000 security incidents and over 22,000 confirmed breaches across 145 countries. The report is described as drawing on Verizon’s own investigations and partner-contributed data, and it highlighted trends including vulnerability exploitation becoming the top initial access vector, ransomware appearing in 48% of breaches, increased third-party breach involvement, and growing security risks from AI and shadow AI. Security-relevant activity in the content also includes Verizon joining Anthropic’s Project Glasswing, an AI-driven vulnerability research initiative, where it was described as the first telecom operator publicly identified in the program. Verizon is also listed as a founding member of the Communications Cybersecurity Information Sharing and Analysis Center (C2 ISAC), alongside other major telecom providers, to improve threat intelligence sharing and collective defense across the telecom sector. Consumer-facing references in the content identify Verizon as a mobile carrier offering services such as spam-filtering and call protection apps and port-out PIN protections.

Mentions22HQUS
#21Cloudflare
Corporation

Cloudflare is a web infrastructure and security company referenced throughout the content as a major cloud and internet platform provider. The content directly associates it with reverse proxy and CDN-style infrastructure, Cloudflare Tunnel, Cloudflare Workers, and Cloudflare Pages/free-tier hosting on pages.dev. It is also described as publishing threat research and a 2026 threat report, and as having a security team that evaluated Anthropic’s Mythos Preview model under Project Glasswing. Cloudflare is named alongside major technology and telecom firms participating in Project Glasswing, and the content also notes production deployment of the ML-KEM hybrid key exchange X25519MLKEM768 at Cloudflare. Security-relevant references include Cloudflare independently flagging phishing domains with warning pages, while multiple reports also describe threat actors abusing Cloudflare-fronted infrastructure, redirects, tunnels, Workers, and Cloudflare-hosted services to mask origin servers, proxy attacker traffic, host payloads or phishing content, and evade detection. The content does not provide high-confidence details on headquarters, employee count, or organization size.

Mentions22HQUS
#22Mistral AI
Corporation

Mistral AI is a France-based artificial intelligence company described in the content as Europe’s only player in frontier AI. It develops AI models and publishes official software development kits in both the npm and PyPI ecosystems, including packages such as @mistralai/mistralai, @mistralai/mistralai-azure, @mistralai/mistralai-gcp, and the Python package mistralai. The organization is also referenced as a signatory to the EU GPAI Code of Practice alongside other major AI providers. Security-relevant reporting in the content states that Mistral AI was impacted by multiple 2026 software supply-chain incidents attributed to TeamPCP, including the broader TanStack and Mini Shai-Hulud campaigns. These incidents involved compromises of official Mistral AI npm and PyPI packages through stolen CI/CD or publishing credentials and trusted publishing workflows, affecting developer workstations, CI/CD pipelines, and downstream consumers. Reporting also states that TeamPCP advertised or threatened to leak Mistral AI source code allegedly stolen via compromised CI/CD credentials. The content further notes reporting that Mistral has reportedly developed a hacking-capable AI model that it may provide to large European banks.

Mentions22Industry4510
#23Trend Micro
Corporation

Trend Micro is a cybersecurity company and threat research organization. In the provided content, it is referenced as publishing threat intelligence and security research on phishing campaigns, malware, software supply chain compromises, and enterprise AI security. Its research teams are cited in connection with analysis of threats such as Kuse-hosted phishing activity, Banana RAT, and the LiteLLM supply chain compromise. Trend Micro’s Zero Day Initiative (ZDI) is also referenced as a vulnerability research and coordinated disclosure program associated with the company, including Pwn2Own and CVE discovery activity. The content further shows Trend Micro collaborating with INTERPOL and other cybersecurity partners to track malicious infrastructure and support investigations during Operation Ramz in the Middle East and North Africa. No headquarters, employee count, or organization size is directly stated in the provided content.

Mentions20Industry4510
#24Discord
Corporation

Discord is a communication platform that offers text chat, voice calls, video calls, livestreaming, and community servers across desktop, mobile, web, and console platforms including PlayStation and Xbox. The content states that Discord has an estimated 690 million registered users and more than 200 million monthly active users worldwide. In March 2026, Discord completed a rollout of end-to-end encryption by default for voice and video communications, including direct messages, group DMs, voice channels, and Go Live streams, using its open-source DAVE protocol; Stage channels are excluded, and Discord said it has no current plans to extend end-to-end encryption to text messages. Security-relevant references in the content show Discord is frequently abused by threat actors as a delivery or social-engineering channel, including phishing messages linking to fake verification or reCAPTCHA pages, and its infrastructure such as cdn.discordapp.com has been cited as an abused hosting domain. Multiple malware families and stealers referenced in the content target Discord data or tokens. The content also notes Discord was among major technology platforms contacted by the U.S. Federal Trade Commission regarding compliance obligations under the Take It Down Act, and that Discord has delayed some age-verification rollouts due to user backlash and security concerns.

Mentions20Industry5020