BlogManifesto

Blog

September 2, 2025

Pre-Validation vs Post-Validation: Ending the Alert Overload Era in Cybersecurity

by
Tal Kandel, CISSP - Co-Founder and CBO

August 11, 2025

These Aren’t Your Old-School Attacks: How AI Bots & Sneaky Phishing Are Crushing Security Teams

by
Yossi Dantes, Co-Founder and CPO

July 30, 2025

The Hidden Risk in Your DNS: How Forgotten Hosts Are Opening the Door to AI-Powered Subdomain Takeovers

by
Yinon Azar - Cyber Security Researcher

July 17, 2025

From Reactive to Proactive: Introducing Indicators of Pre-Attack - Introduction: The Illusion of Readiness

by
Tal Kandel, CISSP - Co-Founder and CBO

July 9, 2025

Subdomain Takeover: The Silent Threat to Your Session Tokens in the Age of AI-Powered Attackers

by
Yossi Dantes, Co-Founder and CPO

June 30, 2025

Hijacked by Trust: How AI.Attackers Weaponize Legitimate Cloud Services

by
Yossi Dantes, Co-Founder and CPO
1 / 2
Next
Ray 03
Linkedin iconPrivacy Policy

© 2025 malanta.ai. All rights reserved.

Ray 02