Blog:

On 2026-05-18
by Rhidian Jowers
Cybersecurity

Mythos or mirage: The hidden burden of agentic security

Table mythos or mirage
The recent arrival of Claude Mythos Preview has been met with the usual industry fanfare, promising a new era of agentic security where AI finally moves from being a passive observer to an active defender. However, as we have seen with every previous iteration of machine learning in this space, unbridled enthusiasm usually precedes a [...]
  • Share

Discover all the latest releases

Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
CSR Best Practices Sustainability

What are the Best Practices to Build Your CSR Strategy? 

In today's economic landscape, corporate social responsibility (CSR) has become an integral part of every organisation's strategy. A well-defined CSR strategy not only makes a positive contribution to society, but also enhances a company's brand.

Read more
Ship on the ocean Cybersecurity

What is Export Control? A Well-Kept Recipe!

Are you sure that you are authorised to sell your products to foreign companies and to domestic ones established in foreign countries? Have you checked whether all the components and subsystems of your product can be exported ? Are you certain that you are allowed to share technical information with your foreign interlocutor ? Having[...]

Read more
Airbus Protect Explains: the New EU Regulation on Batteries Sustainability

Airbus Protect Explains: the New EU Regulation on Batteries

Introduction As many states and industries undergo a widespread shift from fossil fuels to emission-free electrification, batteries are becoming a crucial storage tool to facilitate energy transition. With falling costs, advancing innovation and supportive policies, the demand for this technology (essential for achieving climate and energy targets) is only increasing, according to a recent IEA [...]

Read more
CSIRT blogpost

Incident Response: Analysis of recent version of BRC4

Introduction During our latest incident response case we have discovered a recent sample of Brute Ratel C4 packed with Themida. BRC4 is a powerful Command and Control (C2) tool which allows to control targeted workstations through an executable agent. The objective of Themida is to protect code against reverse engineering. Currently, C2 tools are used [...]

Read more
understanding digital risk management Cybersecurity

Digital Risk Management: A Business-Aligned Approach

Organisations today face a complex and evolving array of risks that require effective management. Some are inherently digital, while others are traditional risks amplified by technology. From cyberattacks to technical disruptions, these threats pose significant challenges for businesses, holding the power to impact operations, finances, reputation, and ultimately bottom line.  To safeguard their future, organisations [...]

Read more