The

Blog

The

Blog

This analysis of the F5 BIG-IP breach showcases how Dream’s Posture Engine transforms static visibility into genuine defensive intelligence. Powered by CLM and Dream’s cyber ontology, the platform reveals how misconfigurations and privilege relationships create real attack paths by prioritizing risks based on exploitability and impact. In the F5 supply
This report links nine coordinated phishing campaigns from 2025 to the Iranian APT group MuddyWater, revealing a single, consistent operational footprint across attacks targeting governments and diplomatic sectors worldwide. Through analysis of shared C2 behavior, VBS loaders, and repeated staging logic, the investigation connects previously isolated incidents into one unified
In August 2025, Dream uncovered a large-scale Iran-nexus spear-phishing campaign that used a compromised Omani MFA mailbox to target governments worldwide. Attributed to the MOIS-aligned Homeland Justice group, the operation deployed malicious diplomatic-themed emails containing macro-encoded payloads. Analysis revealed a far broader campaign than initially believed, using 104 compromised accounts
Dream is launching its AI Cyber Factory, built on the NVIDIA Enterprise AI Factory validated design and powered by NVIDIA NIM microservices, to deliver adaptive, secure, and autonomous cyber defense for national infrastructure. Unlike traditional tools that provide fragmented visibility and manual workflows, Dream’s platform continuously monitors, interprets, and responds

Featured Resources

CONTACT US

Fill out the form to get in touch with our Expert Team.