The
Blog
Dream Research Labs
When a Missile Alert App Becomes an Intelligence Tool In the middle of a war, trust is maybe the most fragile asset. Missile alert apps are not just software for civilians in Israel and in War Zones. They are lifelines. People rely on them for seconds that can save lives.
Dream Research Labs
Hey Claude, Security is not just Code! Claude Code Security versus Dream Security Anthropic’s Claude Code Security announcement triggered predictable reactions across the industry. Excitement, curiosity, and in some corners, anxiety. Whenever a frontier LLM vendor steps into anything labeled “security,” the same question surfaces: is this the beginning of
Dream Research Labs
In January 2026, Dream uncovered a targeted supply-chain attack in Southeast Asia, where malicious updates were delivered through MicroWorld Technologies’ eScan antivirus infrastructure. Dubbed Verglas internally, the campaign replaced a trusted component with a trojanized version, enabling remote access and blocking future updates to prevent cleanup. Building on earlier reports
Dream Research Labs
Between late Dec 2025 and mid-Jan 2026, a covert cyber-espionage campaign targeted diplomatic, election, and policy officials by exploiting trust rather than technical vulnerabilities. Attackers distributed malicious documents masquerading as diplomatic briefings or materials that appeared credible, timely, and aligned with real geopolitical events. Simply opening the files triggered compromise,
Dream Research Labs
Most organizations unknowingly carry generic AD permissions that are broader than intended and silently create privilege-escalation and MFA-bypass risk. Dream demonstrates how simple LDAP writes combined with Duo directory sync bypass MFA (phone import + SMS). The core problem isn’t exotic exploits; it’s unseen, overbroad permissions. Dream addresses this by
The Dream Team
Dream’s Identity Researcher is an LLM-powered tool that finds hidden privilege escalation routes in Active Directory by identifying tiering violations where lower-tier objects can access Tier 0 assets. These misconfigurations are common and often create silent paths to full-domain compromise, but now with the Identity Researcher, they are exposed before